Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
Typedeb
Namespacedebian
Nameopenjdk-11
Version11.0.16+8-1~deb10u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version11.0.31~10ea-1
Latest_non_vulnerable_version11.0.31~10ea-1
Affected_by_vulnerabilities
0
url VCID-11vj-5zz4-6fe7
vulnerability_id VCID-11vj-5zz4-6fe7
summary openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30698
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69565
published_at 2026-04-02T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69621
published_at 2026-04-13T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69627
published_at 2026-04-09T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.6965
published_at 2026-04-11T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-12T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69581
published_at 2026-04-04T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.6956
published_at 2026-04-07T12:55:00Z
7
value 0.00605
scoring_system epss
scoring_elements 0.69611
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359693
reference_id 2359693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359693
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:13:36Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://access.redhat.com/errata/RHSA-2025:8063
reference_id RHSA-2025:8063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8063
25
reference_url https://access.redhat.com/errata/RHSA-2025:8431
reference_id RHSA-2025:8431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8431
26
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
27
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
28
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
29
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
30
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
31
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
32
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-30698
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-11vj-5zz4-6fe7
1
url VCID-13t7-vubq-8kae
vulnerability_id VCID-13t7-vubq-8kae
summary openjdk: Enhance certificate handling (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53057
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22702
published_at 2026-04-02T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22587
published_at 2026-04-13T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22666
published_at 2026-04-09T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22683
published_at 2026-04-11T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22642
published_at 2026-04-12T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22747
published_at 2026-04-04T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22535
published_at 2026-04-07T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22612
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53057
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
reference_id 1118944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403082
reference_id 2403082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403082
6
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T14:46:38Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:18814
reference_id RHSA-2025:18814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18814
8
reference_url https://access.redhat.com/errata/RHSA-2025:18815
reference_id RHSA-2025:18815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18815
9
reference_url https://access.redhat.com/errata/RHSA-2025:18816
reference_id RHSA-2025:18816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18816
10
reference_url https://access.redhat.com/errata/RHSA-2025:18817
reference_id RHSA-2025:18817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18817
11
reference_url https://access.redhat.com/errata/RHSA-2025:18818
reference_id RHSA-2025:18818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18818
12
reference_url https://access.redhat.com/errata/RHSA-2025:18819
reference_id RHSA-2025:18819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18819
13
reference_url https://access.redhat.com/errata/RHSA-2025:18820
reference_id RHSA-2025:18820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18820
14
reference_url https://access.redhat.com/errata/RHSA-2025:18821
reference_id RHSA-2025:18821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18821
15
reference_url https://access.redhat.com/errata/RHSA-2025:18822
reference_id RHSA-2025:18822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18822
16
reference_url https://access.redhat.com/errata/RHSA-2025:18823
reference_id RHSA-2025:18823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18823
17
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
18
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
19
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
20
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
21
reference_url https://access.redhat.com/errata/RHSA-2025:22370
reference_id RHSA-2025:22370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22370
22
reference_url https://access.redhat.com/errata/RHSA-2025:22672
reference_id RHSA-2025:22672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22672
23
reference_url https://usn.ubuntu.com/7881-1/
reference_id USN-7881-1
reference_type
scores
url https://usn.ubuntu.com/7881-1/
24
reference_url https://usn.ubuntu.com/7882-1/
reference_id USN-7882-1
reference_type
scores
url https://usn.ubuntu.com/7882-1/
25
reference_url https://usn.ubuntu.com/7883-1/
reference_id USN-7883-1
reference_type
scores
url https://usn.ubuntu.com/7883-1/
26
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
27
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
28
reference_url https://usn.ubuntu.com/7900-1/
reference_id USN-7900-1
reference_type
scores
url https://usn.ubuntu.com/7900-1/
29
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
30
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-53057
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13t7-vubq-8kae
2
url VCID-2tju-1r8k-sbf9
vulnerability_id VCID-2tju-1r8k-sbf9
summary OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61756
published_at 2026-04-13T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.617
published_at 2026-04-02T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-04T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61701
published_at 2026-04-07T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.6175
published_at 2026-04-08T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61766
published_at 2026-04-09T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61787
published_at 2026-04-11T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61775
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
reference_id 2275005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
25
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
26
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
27
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
28
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
29
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
30
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
31
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
32
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
33
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
34
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
35
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
36
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
37
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
38
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
39
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
40
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
41
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
42
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
43
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21094
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tju-1r8k-sbf9
3
url VCID-3tav-ffar-hfhb
vulnerability_id VCID-3tav-ffar-hfhb
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-02T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30566
published_at 2026-04-13T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30561
published_at 2026-04-07T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30619
published_at 2026-04-08T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30653
published_at 2026-04-09T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30658
published_at 2026-04-11T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30613
published_at 2026-04-12T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.3075
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
reference_id 2160475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0203
reference_id RHSA-2023:0203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0203
27
reference_url https://access.redhat.com/errata/RHSA-2023:0204
reference_id RHSA-2023:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0204
28
reference_url https://access.redhat.com/errata/RHSA-2023:0205
reference_id RHSA-2023:0205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0205
29
reference_url https://access.redhat.com/errata/RHSA-2023:0206
reference_id RHSA-2023:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0206
30
reference_url https://access.redhat.com/errata/RHSA-2023:0207
reference_id RHSA-2023:0207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0207
31
reference_url https://access.redhat.com/errata/RHSA-2023:0208
reference_id RHSA-2023:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0208
32
reference_url https://access.redhat.com/errata/RHSA-2023:0209
reference_id RHSA-2023:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0209
33
reference_url https://access.redhat.com/errata/RHSA-2023:0210
reference_id RHSA-2023:0210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0210
34
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
35
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
36
reference_url https://access.redhat.com/errata/RHSA-2023:0354
reference_id RHSA-2023:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0354
37
reference_url https://access.redhat.com/errata/RHSA-2023:0387
reference_id RHSA-2023:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0387
38
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
39
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
40
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
41
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
42
reference_url https://usn.ubuntu.com/5898-1/
reference_id USN-5898-1
reference_type
scores
url https://usn.ubuntu.com/5898-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-21843
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tav-ffar-hfhb
4
url VCID-47ae-xdqr-6qgb
vulnerability_id VCID-47ae-xdqr-6qgb
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21540
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.6268
published_at 2026-04-02T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62713
published_at 2026-04-04T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62677
published_at 2026-04-07T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.62728
published_at 2026-04-13T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62745
published_at 2026-04-09T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62763
published_at 2026-04-11T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62752
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21540
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108540
reference_id 2108540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108540
8
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
9
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
10
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
11
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
12
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
13
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
14
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
15
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
16
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
17
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
18
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
19
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
20
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
21
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
22
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
23
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
24
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
25
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
26
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
27
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
28
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
29
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-21540
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47ae-xdqr-6qgb
5
url VCID-4snj-etwf-eqe8
vulnerability_id VCID-4snj-etwf-eqe8
summary openjdk: Improve HttpServer Request handling (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21933
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09035
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09077
published_at 2026-04-13T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09121
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09122
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09091
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09086
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.0901
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.0909
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429926
reference_id 2429926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429926
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:56:13Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2026-21933
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4snj-etwf-eqe8
6
url VCID-5et1-ytak-xqh7
vulnerability_id VCID-5et1-ytak-xqh7
summary OpenJDK: Excessive symbol length can lead to infinite loop (8319859)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.5617
published_at 2026-04-13T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56165
published_at 2026-04-04T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56195
published_at 2026-04-08T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56201
published_at 2026-04-09T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.5621
published_at 2026-04-11T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56186
published_at 2026-04-12T12:55:00Z
6
value 0.00333
scoring_system epss
scoring_elements 0.56144
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
reference_id 2297962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21138
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5et1-ytak-xqh7
7
url VCID-6196-gvhx-ruh8
vulnerability_id VCID-6196-gvhx-ruh8
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38305
published_at 2026-04-07T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38417
published_at 2026-04-02T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38441
published_at 2026-04-04T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38355
published_at 2026-04-08T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38363
published_at 2026-04-09T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.3838
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44159
published_at 2026-04-13T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44158
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
reference_id 2318534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2024-21235
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6196-gvhx-ruh8
8
url VCID-76rb-sg3r-bqce
vulnerability_id VCID-76rb-sg3r-bqce
summary OpenJDK: potential UTF8 size overflow (8314794)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63286
published_at 2026-04-13T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63252
published_at 2026-04-07T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63303
published_at 2026-04-08T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63321
published_at 2026-04-09T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63338
published_at 2026-04-11T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-12T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63258
published_at 2026-04-02T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63287
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
reference_id 2297961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21131
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76rb-sg3r-bqce
9
url VCID-8cup-qnc8-wudx
vulnerability_id VCID-8cup-qnc8-wudx
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55466
published_at 2026-04-13T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55441
published_at 2026-04-02T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55465
published_at 2026-04-04T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55444
published_at 2026-04-07T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55495
published_at 2026-04-09T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55505
published_at 2026-04-11T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55483
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
reference_id 2257837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-20952
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cup-qnc8-wudx
10
url VCID-8wud-7t2q-xfa3
vulnerability_id VCID-8wud-7t2q-xfa3
summary OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21968.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21968.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21968
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23735
published_at 2026-04-04T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23693
published_at 2026-04-02T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25179
published_at 2026-04-09T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25193
published_at 2026-04-11T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.2515
published_at 2026-04-12T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25098
published_at 2026-04-13T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25064
published_at 2026-04-07T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25134
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21968
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187802
reference_id 2187802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187802
18
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
19
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
20
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
21
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
22
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
23
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
24
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
25
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
26
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
27
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
28
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
29
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
30
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
31
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
32
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
33
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
34
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
35
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
36
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
37
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
38
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
39
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
40
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
41
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
42
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
43
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
44
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
45
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
46
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
47
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-21968
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wud-7t2q-xfa3
11
url VCID-9n5v-4daz-eyc2
vulnerability_id VCID-9n5v-4daz-eyc2
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26611
published_at 2026-04-13T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26708
published_at 2026-04-09T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26713
published_at 2026-04-11T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26668
published_at 2026-04-12T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26767
published_at 2026-04-02T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26807
published_at 2026-04-04T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26591
published_at 2026-04-07T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26658
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
reference_id 2318530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2024-21217
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5v-4daz-eyc2
12
url VCID-9urr-3gt2-mfhe
vulnerability_id VCID-9urr-3gt2-mfhe
summary OpenJDK: long Exception message leading to crash (8319851)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.567
published_at 2026-04-13T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.5668
published_at 2026-04-07T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56701
published_at 2026-04-04T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56732
published_at 2026-04-08T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-09T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56745
published_at 2026-04-11T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.56721
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
reference_id 2274977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
25
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
26
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
27
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
28
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
29
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
30
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
31
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
32
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
33
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
34
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
35
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
36
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
37
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
38
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
39
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
40
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
41
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21011
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9urr-3gt2-mfhe
13
url VCID-9uzg-sja9-hkcy
vulnerability_id VCID-9uzg-sja9-hkcy
summary OpenJDK: Swing HTML parsing issue (8296832)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21939.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21939.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21939
reference_id
reference_type
scores
0
value 0.01861
scoring_system epss
scoring_elements 0.83001
published_at 2026-04-02T12:55:00Z
1
value 0.01861
scoring_system epss
scoring_elements 0.83048
published_at 2026-04-13T12:55:00Z
2
value 0.01861
scoring_system epss
scoring_elements 0.83014
published_at 2026-04-04T12:55:00Z
3
value 0.01861
scoring_system epss
scoring_elements 0.83012
published_at 2026-04-07T12:55:00Z
4
value 0.01861
scoring_system epss
scoring_elements 0.83037
published_at 2026-04-08T12:55:00Z
5
value 0.01861
scoring_system epss
scoring_elements 0.83044
published_at 2026-04-09T12:55:00Z
6
value 0.01861
scoring_system epss
scoring_elements 0.83059
published_at 2026-04-11T12:55:00Z
7
value 0.01861
scoring_system epss
scoring_elements 0.83053
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21939
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187724
reference_id 2187724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187724
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-21939
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9uzg-sja9-hkcy
14
url VCID-a282-ksr4-j3cu
vulnerability_id VCID-a282-ksr4-j3cu
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26809
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26849
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26634
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26702
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26753
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26756
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26712
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26655
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
reference_id 2243627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
6
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
7
reference_url https://access.redhat.com/errata/RHSA-2023:5725
reference_id RHSA-2023:5725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5725
8
reference_url https://access.redhat.com/errata/RHSA-2023:5726
reference_id RHSA-2023:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5726
9
reference_url https://access.redhat.com/errata/RHSA-2023:5727
reference_id RHSA-2023:5727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5727
10
reference_url https://access.redhat.com/errata/RHSA-2023:5728
reference_id RHSA-2023:5728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5728
11
reference_url https://access.redhat.com/errata/RHSA-2023:5729
reference_id RHSA-2023:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5729
12
reference_url https://access.redhat.com/errata/RHSA-2023:5730
reference_id RHSA-2023:5730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5730
13
reference_url https://access.redhat.com/errata/RHSA-2023:5731
reference_id RHSA-2023:5731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5731
14
reference_url https://access.redhat.com/errata/RHSA-2023:5732
reference_id RHSA-2023:5732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5732
15
reference_url https://access.redhat.com/errata/RHSA-2023:5733
reference_id RHSA-2023:5733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5733
16
reference_url https://access.redhat.com/errata/RHSA-2023:5734
reference_id RHSA-2023:5734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5734
17
reference_url https://access.redhat.com/errata/RHSA-2023:5735
reference_id RHSA-2023:5735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5735
18
reference_url https://access.redhat.com/errata/RHSA-2023:5736
reference_id RHSA-2023:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5736
19
reference_url https://access.redhat.com/errata/RHSA-2023:5737
reference_id RHSA-2023:5737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5737
20
reference_url https://access.redhat.com/errata/RHSA-2023:5739
reference_id RHSA-2023:5739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5739
21
reference_url https://access.redhat.com/errata/RHSA-2023:5740
reference_id RHSA-2023:5740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5740
22
reference_url https://access.redhat.com/errata/RHSA-2023:5741
reference_id RHSA-2023:5741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5741
23
reference_url https://access.redhat.com/errata/RHSA-2023:5742
reference_id RHSA-2023:5742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5742
24
reference_url https://access.redhat.com/errata/RHSA-2023:5743
reference_id RHSA-2023:5743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5743
25
reference_url https://access.redhat.com/errata/RHSA-2023:5744
reference_id RHSA-2023:5744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5744
26
reference_url https://access.redhat.com/errata/RHSA-2023:5745
reference_id RHSA-2023:5745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5745
27
reference_url https://access.redhat.com/errata/RHSA-2023:5746
reference_id RHSA-2023:5746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5746
28
reference_url https://access.redhat.com/errata/RHSA-2023:5747
reference_id RHSA-2023:5747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5747
29
reference_url https://access.redhat.com/errata/RHSA-2023:5750
reference_id RHSA-2023:5750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5750
30
reference_url https://access.redhat.com/errata/RHSA-2023:5751
reference_id RHSA-2023:5751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5751
31
reference_url https://access.redhat.com/errata/RHSA-2023:5752
reference_id RHSA-2023:5752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5752
32
reference_url https://access.redhat.com/errata/RHSA-2023:5753
reference_id RHSA-2023:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5753
33
reference_url https://access.redhat.com/errata/RHSA-2023:5761
reference_id RHSA-2023:5761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5761
34
reference_url https://access.redhat.com/errata/RHSA-2023:6738
reference_id RHSA-2023:6738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6738
35
reference_url https://access.redhat.com/errata/RHSA-2023:6887
reference_id RHSA-2023:6887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6887
36
reference_url https://access.redhat.com/errata/RHSA-2024:0866
reference_id RHSA-2024:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0866
37
reference_url https://access.redhat.com/errata/RHSA-2024:0879
reference_id RHSA-2024:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0879
38
reference_url https://usn.ubuntu.com/6527-1/
reference_id USN-6527-1
reference_type
scores
url https://usn.ubuntu.com/6527-1/
39
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-22081
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a282-ksr4-j3cu
15
url VCID-a3xk-3wya-s3gm
vulnerability_id VCID-a3xk-3wya-s3gm
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.23206
published_at 2026-04-02T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.2325
published_at 2026-04-04T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23039
published_at 2026-04-07T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23112
published_at 2026-04-08T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23165
published_at 2026-04-09T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23185
published_at 2026-04-11T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23147
published_at 2026-04-12T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23089
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
reference_id 2160421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
27
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
28
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
29
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
30
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-21835
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3xk-3wya-s3gm
16
url VCID-a59u-h67v-yygm
vulnerability_id VCID-a59u-h67v-yygm
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22041.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22041.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22041
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22241
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22289
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22073
published_at 2026-04-07T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22154
published_at 2026-04-08T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22208
published_at 2026-04-09T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22229
published_at 2026-04-11T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22188
published_at 2026-04-12T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22128
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22041
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2223207
reference_id 2223207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2223207
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
27
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
28
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
29
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
30
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
31
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
32
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
33
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
34
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
35
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
36
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-22041
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a59u-h67v-yygm
17
url VCID-apsn-z1br-3bdy
vulnerability_id VCID-apsn-z1br-3bdy
summary openjdk: Enhance Certificate Checking (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21945
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16874
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16728
published_at 2026-04-13T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16854
published_at 2026-04-09T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16832
published_at 2026-04-11T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16786
published_at 2026-04-12T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.1693
published_at 2026-04-04T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16714
published_at 2026-04-07T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16799
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429927
reference_id 2429927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429927
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:04:39Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2026-21945
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apsn-z1br-3bdy
18
url VCID-b32x-4pu4-jkh4
vulnerability_id VCID-b32x-4pu4-jkh4
summary openjdk: Better Glyph drawing (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30749
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.6625
published_at 2026-04-02T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66247
published_at 2026-04-07T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66277
published_at 2026-04-04T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66294
published_at 2026-04-08T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66307
published_at 2026-04-09T12:55:00Z
5
value 0.00672
scoring_system epss
scoring_elements 0.71372
published_at 2026-04-12T12:55:00Z
6
value 0.00672
scoring_system epss
scoring_elements 0.71355
published_at 2026-04-13T12:55:00Z
7
value 0.00672
scoring_system epss
scoring_elements 0.71388
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376783
reference_id 2376783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376783
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:23:21Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
22
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
23
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
24
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
25
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
26
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
27
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
28
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-30749
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b32x-4pu4-jkh4
19
url VCID-duy9-6f1p-vqah
vulnerability_id VCID-duy9-6f1p-vqah
summary openjdk: Enhance Handling of URIs (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21932
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09259
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09314
published_at 2026-04-13T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09346
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09356
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09328
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0931
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09227
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09302
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429925
reference_id 2429925
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429925
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:55:36Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
8
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
9
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
10
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
11
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
12
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
13
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
14
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
15
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
16
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
17
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
18
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
19
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2026-21932
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-duy9-6f1p-vqah
20
url VCID-dwh6-xw5k-mqg8
vulnerability_id VCID-dwh6-xw5k-mqg8
summary OpenJDK: missing string checks for NULL characters (8296622)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21937.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21937.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21937
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25149
published_at 2026-04-02T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24993
published_at 2026-04-13T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25188
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.2496
published_at 2026-04-07T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25029
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25073
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25087
published_at 2026-04-11T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25047
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21937
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187790
reference_id 2187790
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187790
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-21937
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwh6-xw5k-mqg8
21
url VCID-dyg2-udwy-cud7
vulnerability_id VCID-dyg2-udwy-cud7
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22045
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.3604
published_at 2026-04-13T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36098
published_at 2026-04-09T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36104
published_at 2026-04-11T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36066
published_at 2026-04-12T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.3603
published_at 2026-04-07T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.3608
published_at 2026-04-08T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42145
published_at 2026-04-02T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42172
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221645
reference_id 2221645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221645
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4166
reference_id RHSA-2023:4166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4166
27
reference_url https://access.redhat.com/errata/RHSA-2023:4167
reference_id RHSA-2023:4167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4167
28
reference_url https://access.redhat.com/errata/RHSA-2023:4168
reference_id RHSA-2023:4168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4168
29
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
30
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
31
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
32
reference_url https://access.redhat.com/errata/RHSA-2023:4172
reference_id RHSA-2023:4172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4172
33
reference_url https://access.redhat.com/errata/RHSA-2023:4173
reference_id RHSA-2023:4173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4173
34
reference_url https://access.redhat.com/errata/RHSA-2023:4174
reference_id RHSA-2023:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4174
35
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
36
reference_url https://access.redhat.com/errata/RHSA-2023:4176
reference_id RHSA-2023:4176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4176
37
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
38
reference_url https://access.redhat.com/errata/RHSA-2023:4178
reference_id RHSA-2023:4178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4178
39
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
40
reference_url https://access.redhat.com/errata/RHSA-2023:4209
reference_id RHSA-2023:4209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4209
41
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
42
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
43
reference_url https://access.redhat.com/errata/RHSA-2023:4212
reference_id RHSA-2023:4212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4212
44
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
45
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
46
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-22045
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyg2-udwy-cud7
22
url VCID-e6dm-6767-9kdk
vulnerability_id VCID-e6dm-6767-9kdk
summary openjdk: Improve HTTP client header handling (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32274
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32136
published_at 2026-04-07T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32311
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32185
published_at 2026-04-08T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32212
published_at 2026-04-09T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32631
published_at 2026-04-12T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32603
published_at 2026-04-13T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32669
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
reference_id 2376785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:42:42Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
7
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
8
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
9
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
10
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
11
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
12
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
13
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
14
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
15
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
16
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
17
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
18
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
19
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
20
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
21
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
22
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-50059
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6dm-6767-9kdk
23
url VCID-fau4-ajny-nfbd
vulnerability_id VCID-fau4-ajny-nfbd
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40536
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40563
published_at 2026-04-08T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40574
published_at 2026-04-09T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40556
published_at 2026-04-12T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-02T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40592
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40513
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
reference_id 2257859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-20921
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fau4-ajny-nfbd
24
url VCID-fhj9-p1gx-c7hp
vulnerability_id VCID-fhj9-p1gx-c7hp
summary OpenJDK: incorrect enqueue of references in garbage collector (8298191)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21954.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21954
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15167
published_at 2026-04-13T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15288
published_at 2026-04-02T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15357
published_at 2026-04-04T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15161
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15249
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15301
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.1527
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15232
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187441
reference_id 2187441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187441
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-21954
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhj9-p1gx-c7hp
25
url VCID-fwk5-wqvn-4qaz
vulnerability_id VCID-fwk5-wqvn-4qaz
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
reference_id
reference_type
scores
0
value 0.00211
scoring_system epss
scoring_elements 0.43651
published_at 2026-04-13T12:55:00Z
1
value 0.00211
scoring_system epss
scoring_elements 0.43665
published_at 2026-04-02T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.4369
published_at 2026-04-04T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.43625
published_at 2026-04-07T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.43676
published_at 2026-04-08T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.4368
published_at 2026-04-09T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.437
published_at 2026-04-11T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43668
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
reference_id 2257850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
29
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
30
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
31
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
32
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
33
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
34
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-20926
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwk5-wqvn-4qaz
26
url VCID-fwv1-sj5y-xygd
vulnerability_id VCID-fwv1-sj5y-xygd
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21619
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49517
published_at 2026-04-02T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49544
published_at 2026-04-04T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49496
published_at 2026-04-07T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49551
published_at 2026-04-08T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49546
published_at 2026-04-09T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49563
published_at 2026-04-11T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49535
published_at 2026-04-12T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49537
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21619
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133745
reference_id 2133745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133745
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
17
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
18
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
19
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
20
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
21
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
22
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
23
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
24
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
25
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
26
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
27
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
28
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
29
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
30
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
31
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
32
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
33
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
34
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
35
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
36
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-21619
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwv1-sj5y-xygd
27
url VCID-gjgy-dfq7-zfb2
vulnerability_id VCID-gjgy-dfq7-zfb2
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22049
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20289
published_at 2026-04-13T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20363
published_at 2026-04-09T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20392
published_at 2026-04-11T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20347
published_at 2026-04-12T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20223
published_at 2026-04-07T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20303
published_at 2026-04-08T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24864
published_at 2026-04-02T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24903
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22049
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221647
reference_id 2221647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221647
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4166
reference_id RHSA-2023:4166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4166
27
reference_url https://access.redhat.com/errata/RHSA-2023:4167
reference_id RHSA-2023:4167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4167
28
reference_url https://access.redhat.com/errata/RHSA-2023:4168
reference_id RHSA-2023:4168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4168
29
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
30
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
31
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
32
reference_url https://access.redhat.com/errata/RHSA-2023:4172
reference_id RHSA-2023:4172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4172
33
reference_url https://access.redhat.com/errata/RHSA-2023:4173
reference_id RHSA-2023:4173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4173
34
reference_url https://access.redhat.com/errata/RHSA-2023:4174
reference_id RHSA-2023:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4174
35
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
36
reference_url https://access.redhat.com/errata/RHSA-2023:4176
reference_id RHSA-2023:4176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4176
37
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
38
reference_url https://access.redhat.com/errata/RHSA-2023:4178
reference_id RHSA-2023:4178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4178
39
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
40
reference_url https://access.redhat.com/errata/RHSA-2023:4209
reference_id RHSA-2023:4209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4209
41
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
42
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
43
reference_url https://access.redhat.com/errata/RHSA-2023:4212
reference_id RHSA-2023:4212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4212
44
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
45
reference_url https://access.redhat.com/errata/RHSA-2023:4876
reference_id RHSA-2023:4876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4876
46
reference_url https://access.redhat.com/errata/RHSA-2023:4877
reference_id RHSA-2023:4877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4877
47
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
48
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-22049
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjgy-dfq7-zfb2
28
url VCID-h2w2-8e43-j3g6
vulnerability_id VCID-h2w2-8e43-j3g6
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21624
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42206
published_at 2026-04-02T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-09T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42175
published_at 2026-04-07T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42226
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42257
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.4222
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133765
reference_id 2133765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133765
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
17
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
18
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
19
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
20
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
21
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
22
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
23
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
24
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
25
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
26
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
27
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
28
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
29
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
30
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
31
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
32
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
33
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
34
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
35
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
36
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-21624
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2w2-8e43-j3g6
29
url VCID-h7n1-qfs3-v3fw
vulnerability_id VCID-h7n1-qfs3-v3fw
summary OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3498
published_at 2026-04-13T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35055
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-04T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.34962
published_at 2026-04-07T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35007
published_at 2026-04-08T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35036
published_at 2026-04-09T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-11T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35004
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
reference_id 2274975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
19
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
20
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
21
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
22
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
23
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
24
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
25
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
26
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
27
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
28
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
29
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
30
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
31
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
32
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
33
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21012
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7n1-qfs3-v3fw
30
url VCID-htat-fksw-c3gk
vulnerability_id VCID-htat-fksw-c3gk
summary OpenJDK: Pack200 excessive memory allocation (8322114)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21085.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21085
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29114
published_at 2026-04-13T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29238
published_at 2026-04-02T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29288
published_at 2026-04-04T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29103
published_at 2026-04-07T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29166
published_at 2026-04-12T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29207
published_at 2026-04-09T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29213
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275001
reference_id 2275001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275001
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
15
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:35:49Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
16
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:35:49Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
17
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:35:49Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
19
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
20
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
21
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
22
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
23
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
24
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
25
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
26
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
27
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
28
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21085
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htat-fksw-c3gk
31
url VCID-jm9f-9y4b-qye7
vulnerability_id VCID-jm9f-9y4b-qye7
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39399
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.52035
published_at 2026-04-02T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52061
published_at 2026-04-04T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52027
published_at 2026-04-07T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52081
published_at 2026-04-08T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.52077
published_at 2026-04-09T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52129
published_at 2026-04-11T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52113
published_at 2026-04-12T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52098
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39399
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133776
reference_id 2133776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133776
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
17
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
18
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
19
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
20
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
21
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
22
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
23
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
24
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
25
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
26
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-39399
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jm9f-9y4b-qye7
32
url VCID-jw6x-cntu-nfht
vulnerability_id VCID-jw6x-cntu-nfht
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22036.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22036.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22036
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26986
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.27022
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26812
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26881
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26928
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26932
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26888
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26831
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22036
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221634
reference_id 2221634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221634
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
27
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
28
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
29
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
30
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
31
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
32
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
33
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
34
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
35
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
36
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-22036
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jw6x-cntu-nfht
33
url VCID-jztz-7cuw-t7ep
vulnerability_id VCID-jztz-7cuw-t7ep
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12193
published_at 2026-04-13T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.1226
published_at 2026-04-09T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12267
published_at 2026-04-11T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12229
published_at 2026-04-12T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12285
published_at 2026-04-02T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12331
published_at 2026-04-04T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.1213
published_at 2026-04-07T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12211
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
reference_id 2257874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-20945
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jztz-7cuw-t7ep
34
url VCID-kq78-adbv-67a7
vulnerability_id VCID-kq78-adbv-67a7
summary OpenJDK: improper connection handling during TLS handshake (8294474)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21930.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21930.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21930
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36214
published_at 2026-04-13T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36276
published_at 2026-04-11T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.36239
published_at 2026-04-12T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36941
published_at 2026-04-04T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36908
published_at 2026-04-02T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.36839
published_at 2026-04-09T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36824
published_at 2026-04-08T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36774
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21930
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187435
reference_id 2187435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187435
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-21930
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kq78-adbv-67a7
35
url VCID-mt9c-tby1-wqe9
vulnerability_id VCID-mt9c-tby1-wqe9
summary openjdk: Improve JMX connections (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21925
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10163
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10232
published_at 2026-04-13T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.1026
published_at 2026-04-09T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10292
published_at 2026-04-11T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10251
published_at 2026-04-12T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10229
published_at 2026-04-04T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10125
published_at 2026-04-07T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.102
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429924
reference_id 2429924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429924
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:50:27Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2026-21925
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mt9c-tby1-wqe9
36
url VCID-n71d-tx76-vbbd
vulnerability_id VCID-n71d-tx76-vbbd
summary OpenJDK: Out-of-bounds access in 2D image handling (8324559)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.6363
published_at 2026-04-13T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63636
published_at 2026-04-04T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63595
published_at 2026-04-07T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63647
published_at 2026-04-08T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63663
published_at 2026-04-12T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63678
published_at 2026-04-11T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
reference_id 2297976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21145
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n71d-tx76-vbbd
37
url VCID-nr6u-aysf-7kgk
vulnerability_id VCID-nr6u-aysf-7kgk
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
reference_id
reference_type
scores
0
value 0.0017
scoring_system epss
scoring_elements 0.38196
published_at 2026-04-13T12:55:00Z
1
value 0.0017
scoring_system epss
scoring_elements 0.38237
published_at 2026-04-09T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.38255
published_at 2026-04-11T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.3822
published_at 2026-04-12T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38286
published_at 2026-04-02T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38309
published_at 2026-04-04T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.38178
published_at 2026-04-07T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.38228
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
reference_id 2257853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
39
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
40
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
41
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-20919
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nr6u-aysf-7kgk
38
url VCID-ntga-y6cv-a3df
vulnerability_id VCID-ntga-y6cv-a3df
summary openjdk: Enhance array handling (Oracle CPU 2025-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-02T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42054
published_at 2026-04-13T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42094
published_at 2026-04-09T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42116
published_at 2026-04-11T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42079
published_at 2026-04-12T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42092
published_at 2026-04-04T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42029
published_at 2026-04-07T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42081
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
reference_id 2338992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
15
reference_url https://www.oracle.com/security-alerts/cpujan2025.html
reference_id cpujan2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:29:12Z/
url https://www.oracle.com/security-alerts/cpujan2025.html
16
reference_url https://access.redhat.com/errata/RHSA-2025:0421
reference_id RHSA-2025:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0421
17
reference_url https://access.redhat.com/errata/RHSA-2025:0422
reference_id RHSA-2025:0422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0422
18
reference_url https://access.redhat.com/errata/RHSA-2025:0423
reference_id RHSA-2025:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0423
19
reference_url https://access.redhat.com/errata/RHSA-2025:0424
reference_id RHSA-2025:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0424
20
reference_url https://access.redhat.com/errata/RHSA-2025:0425
reference_id RHSA-2025:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0425
21
reference_url https://access.redhat.com/errata/RHSA-2025:0426
reference_id RHSA-2025:0426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0426
22
reference_url https://access.redhat.com/errata/RHSA-2025:0427
reference_id RHSA-2025:0427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0427
23
reference_url https://access.redhat.com/errata/RHSA-2025:0428
reference_id RHSA-2025:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0428
24
reference_url https://access.redhat.com/errata/RHSA-2025:0429
reference_id RHSA-2025:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0429
25
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
26
reference_url https://access.redhat.com/errata/RHSA-2025:2615
reference_id RHSA-2025:2615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2615
27
reference_url https://usn.ubuntu.com/7252-1/
reference_id USN-7252-1
reference_type
scores
url https://usn.ubuntu.com/7252-1/
28
reference_url https://usn.ubuntu.com/7253-1/
reference_id USN-7253-1
reference_type
scores
url https://usn.ubuntu.com/7253-1/
29
reference_url https://usn.ubuntu.com/7254-1/
reference_id USN-7254-1
reference_type
scores
url https://usn.ubuntu.com/7254-1/
30
reference_url https://usn.ubuntu.com/7255-1/
reference_id USN-7255-1
reference_type
scores
url https://usn.ubuntu.com/7255-1/
31
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
32
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-21502
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ntga-y6cv-a3df
39
url VCID-nxx8-nehy-qyhg
vulnerability_id VCID-nxx8-nehy-qyhg
summary openjdk: Enhance Path Factories (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53066
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17286
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17132
published_at 2026-04-13T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17263
published_at 2026-04-09T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17241
published_at 2026-04-11T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17193
published_at 2026-04-12T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17335
published_at 2026-04-04T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17115
published_at 2026-04-07T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17207
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
reference_id 1118944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403063
reference_id 2403063
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403063
6
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T19:44:34Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:18814
reference_id RHSA-2025:18814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18814
8
reference_url https://access.redhat.com/errata/RHSA-2025:18815
reference_id RHSA-2025:18815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18815
9
reference_url https://access.redhat.com/errata/RHSA-2025:18816
reference_id RHSA-2025:18816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18816
10
reference_url https://access.redhat.com/errata/RHSA-2025:18817
reference_id RHSA-2025:18817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18817
11
reference_url https://access.redhat.com/errata/RHSA-2025:18818
reference_id RHSA-2025:18818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18818
12
reference_url https://access.redhat.com/errata/RHSA-2025:18819
reference_id RHSA-2025:18819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18819
13
reference_url https://access.redhat.com/errata/RHSA-2025:18820
reference_id RHSA-2025:18820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18820
14
reference_url https://access.redhat.com/errata/RHSA-2025:18821
reference_id RHSA-2025:18821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18821
15
reference_url https://access.redhat.com/errata/RHSA-2025:18822
reference_id RHSA-2025:18822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18822
16
reference_url https://access.redhat.com/errata/RHSA-2025:18823
reference_id RHSA-2025:18823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18823
17
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
18
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
19
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
20
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
21
reference_url https://access.redhat.com/errata/RHSA-2025:22370
reference_id RHSA-2025:22370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22370
22
reference_url https://access.redhat.com/errata/RHSA-2025:22672
reference_id RHSA-2025:22672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22672
23
reference_url https://usn.ubuntu.com/7881-1/
reference_id USN-7881-1
reference_type
scores
url https://usn.ubuntu.com/7881-1/
24
reference_url https://usn.ubuntu.com/7882-1/
reference_id USN-7882-1
reference_type
scores
url https://usn.ubuntu.com/7882-1/
25
reference_url https://usn.ubuntu.com/7883-1/
reference_id USN-7883-1
reference_type
scores
url https://usn.ubuntu.com/7883-1/
26
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
27
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
28
reference_url https://usn.ubuntu.com/7900-1/
reference_id USN-7900-1
reference_type
scores
url https://usn.ubuntu.com/7900-1/
29
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
30
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-53066
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxx8-nehy-qyhg
40
url VCID-p9na-7jta-9yg4
vulnerability_id VCID-p9na-7jta-9yg4
summary openjdk: Enhance TLS protocol support (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30754
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.3003
published_at 2026-04-02T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.29891
published_at 2026-04-07T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.30077
published_at 2026-04-04T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.29952
published_at 2026-04-08T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.29988
published_at 2026-04-09T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30352
published_at 2026-04-12T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30305
published_at 2026-04-13T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30396
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30754
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376784
reference_id 2376784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376784
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T15:31:20Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
22
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
23
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
24
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
25
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
26
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
27
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-30754
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9na-7jta-9yg4
41
url VCID-q5gr-6u92-6ybk
vulnerability_id VCID-q5gr-6u92-6ybk
summary OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21938.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21938
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25149
published_at 2026-04-02T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24993
published_at 2026-04-13T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25188
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.2496
published_at 2026-04-07T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25029
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25073
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25087
published_at 2026-04-11T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25047
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21938
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187758
reference_id 2187758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187758
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-21938
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5gr-6u92-6ybk
42
url VCID-q9r9-wkqu-6bhu
vulnerability_id VCID-q9r9-wkqu-6bhu
summary OpenJDK: Pack200 increase loading time due to improper header validation (8322106)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21144.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21144
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14775
published_at 2026-04-13T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14764
published_at 2026-04-07T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14855
published_at 2026-04-08T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14909
published_at 2026-04-09T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.1487
published_at 2026-04-11T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14833
published_at 2026-04-12T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14886
published_at 2026-04-02T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14962
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21144
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297964
reference_id 2297964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297964
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:20:24Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0007/
reference_id ntap-20240719-0007
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:20:24Z/
url https://security.netapp.com/advisory/ntap-20240719-0007/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
21
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
22
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
23
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21144
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q9r9-wkqu-6bhu
43
url VCID-rfs8-njaq-qkc8
vulnerability_id VCID-rfs8-njaq-qkc8
summary
Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.

A fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.
references
0
reference_url http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-34169
reference_id
reference_type
scores
0
value 0.06658
scoring_system epss
scoring_elements 0.91212
published_at 2026-04-11T12:55:00Z
1
value 0.06658
scoring_system epss
scoring_elements 0.91206
published_at 2026-04-09T12:55:00Z
2
value 0.06658
scoring_system epss
scoring_elements 0.91199
published_at 2026-04-08T12:55:00Z
3
value 0.06658
scoring_system epss
scoring_elements 0.91186
published_at 2026-04-07T12:55:00Z
4
value 0.06658
scoring_system epss
scoring_elements 0.91216
published_at 2026-04-12T12:55:00Z
5
value 0.06658
scoring_system epss
scoring_elements 0.91215
published_at 2026-04-13T12:55:00Z
6
value 0.08992
scoring_system epss
scoring_elements 0.92592
published_at 2026-04-04T12:55:00Z
7
value 0.08992
scoring_system epss
scoring_elements 0.92585
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-34169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git
9
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
10
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
11
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
12
reference_url https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
13
reference_url https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
14
reference_url https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
15
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-34169
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-34169
29
reference_url https://security.gentoo.org/glsa/202401-25
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202401-25
30
reference_url https://security.netapp.com/advisory/ntap-20220729-0009
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220729-0009
31
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
32
reference_url https://www.debian.org/security/2022/dsa-5188
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5188
33
reference_url https://www.debian.org/security/2022/dsa-5192
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5192
34
reference_url https://www.debian.org/security/2022/dsa-5256
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5256
35
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
36
reference_url https://xalan.apache.org
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://xalan.apache.org
37
reference_url http://www.openwall.com/lists/oss-security/2022/07/19/5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/19/5
38
reference_url http://www.openwall.com/lists/oss-security/2022/07/19/6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/19/6
39
reference_url http://www.openwall.com/lists/oss-security/2022/07/20/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/20/2
40
reference_url http://www.openwall.com/lists/oss-security/2022/07/20/3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/20/3
41
reference_url http://www.openwall.com/lists/oss-security/2022/10/18/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/18/2
42
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/11/04/8
43
reference_url http://www.openwall.com/lists/oss-security/2022/11/07/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/11/07/2
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860
reference_id 1015860
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108554
reference_id 2108554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108554
46
reference_url https://github.com/advisories/GHSA-9339-86wc-4qgf
reference_id GHSA-9339-86wc-4qgf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9339-86wc-4qgf
47
reference_url https://security.gentoo.org/glsa/202405-16
reference_id GLSA-202405-16
reference_type
scores
url https://security.gentoo.org/glsa/202405-16
48
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
49
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
50
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
51
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
52
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
53
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
54
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
55
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
56
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
57
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
58
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
59
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
60
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
61
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
62
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
63
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
64
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
65
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
66
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
67
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
68
reference_url https://access.redhat.com/errata/RHSA-2024:3708
reference_id RHSA-2024:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3708
69
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
70
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-34169, GHSA-9339-86wc-4qgf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfs8-njaq-qkc8
44
url VCID-rggy-f3va-mfay
vulnerability_id VCID-rggy-f3va-mfay
summary OpenJDK: RangeCheckElimination array index overflow (8323231)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
reference_id
reference_type
scores
0
value 0.00721
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-13T12:55:00Z
1
value 0.00721
scoring_system epss
scoring_elements 0.72434
published_at 2026-04-07T12:55:00Z
2
value 0.00721
scoring_system epss
scoring_elements 0.72472
published_at 2026-04-08T12:55:00Z
3
value 0.00721
scoring_system epss
scoring_elements 0.72485
published_at 2026-04-09T12:55:00Z
4
value 0.00721
scoring_system epss
scoring_elements 0.72508
published_at 2026-04-11T12:55:00Z
5
value 0.00721
scoring_system epss
scoring_elements 0.7249
published_at 2026-04-12T12:55:00Z
6
value 0.00721
scoring_system epss
scoring_elements 0.7244
published_at 2026-04-02T12:55:00Z
7
value 0.00721
scoring_system epss
scoring_elements 0.72458
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
reference_id 2297977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21147
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rggy-f3va-mfay
45
url VCID-t4r8-ujpb-5kdk
vulnerability_id VCID-t4r8-ujpb-5kdk
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21541
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60711
published_at 2026-04-02T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-13T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60741
published_at 2026-04-04T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60706
published_at 2026-04-07T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60755
published_at 2026-04-08T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.6077
published_at 2026-04-09T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60795
published_at 2026-04-11T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60781
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108543
reference_id 2108543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108543
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
reference_id H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
reference_id I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
reference_id JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
reference_id KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
reference_id L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
13
reference_url https://security.netapp.com/advisory/ntap-20220729-0009/
reference_id ntap-20220729-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://security.netapp.com/advisory/ntap-20220729-0009/
14
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
15
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
16
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
17
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
18
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
19
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
20
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
21
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
22
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
23
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
24
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
25
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
26
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
27
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
28
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
29
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
30
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
31
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
32
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
33
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
34
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
35
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
reference_id YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-21541
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4r8-ujpb-5kdk
46
url VCID-t5sp-ea5b-f7af
vulnerability_id VCID-t5sp-ea5b-f7af
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21626.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21626
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47467
published_at 2026-04-02T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47488
published_at 2026-04-04T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47437
published_at 2026-04-07T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47492
published_at 2026-04-08T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.4749
published_at 2026-04-09T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47511
published_at 2026-04-11T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47487
published_at 2026-04-12T12:55:00Z
7
value 0.00242
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133753
reference_id 2133753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133753
11
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
12
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
13
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
14
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
15
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
16
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
17
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
18
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
19
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
20
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
21
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
22
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
23
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
24
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
25
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
26
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
27
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
28
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
29
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
30
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
31
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
32
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
33
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
34
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
35
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-21626
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5sp-ea5b-f7af
47
url VCID-u81s-cs95-4yhx
vulnerability_id VCID-u81s-cs95-4yhx
summary openjdk: Better TLS connection support (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21587
reference_id
reference_type
scores
0
value 0.00575
scoring_system epss
scoring_elements 0.687
published_at 2026-04-02T12:55:00Z
1
value 0.00575
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-13T12:55:00Z
2
value 0.00575
scoring_system epss
scoring_elements 0.68767
published_at 2026-04-09T12:55:00Z
3
value 0.00575
scoring_system epss
scoring_elements 0.68789
published_at 2026-04-11T12:55:00Z
4
value 0.00575
scoring_system epss
scoring_elements 0.68775
published_at 2026-04-12T12:55:00Z
5
value 0.00575
scoring_system epss
scoring_elements 0.68718
published_at 2026-04-04T12:55:00Z
6
value 0.00575
scoring_system epss
scoring_elements 0.68696
published_at 2026-04-07T12:55:00Z
7
value 0.00575
scoring_system epss
scoring_elements 0.68748
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21587
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359695
reference_id 2359695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359695
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-17T03:55:41Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://access.redhat.com/errata/RHSA-2025:8063
reference_id RHSA-2025:8063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8063
25
reference_url https://access.redhat.com/errata/RHSA-2025:8431
reference_id RHSA-2025:8431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8431
26
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
27
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
28
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
29
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
30
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
31
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
32
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-21587
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u81s-cs95-4yhx
48
url VCID-um54-6ggz-gqf9
vulnerability_id VCID-um54-6ggz-gqf9
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21628
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48077
published_at 2026-04-02T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48105
published_at 2026-04-13T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48098
published_at 2026-04-04T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48048
published_at 2026-04-07T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-08T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48096
published_at 2026-04-09T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48119
published_at 2026-04-11T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48094
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133769
reference_id 2133769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133769
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
reference_id 37QDWJBGEPP65X43NXQTXQ7KASLUHON6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
reference_id 3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
reference_id 3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
reference_id EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
reference_id HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
18
reference_url https://security.netapp.com/advisory/ntap-20221028-0012/
reference_id ntap-20221028-0012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://security.netapp.com/advisory/ntap-20221028-0012/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
reference_id PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
20
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
21
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
22
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
23
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
24
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
25
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
26
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
27
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
28
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
29
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
30
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
31
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
32
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
33
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
34
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
35
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
36
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
37
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
38
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
39
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
40
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
41
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
42
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
43
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-21628
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-um54-6ggz-gqf9
49
url VCID-vbw8-4j9f-eya5
vulnerability_id VCID-vbw8-4j9f-eya5
summary openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50106
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.46067
published_at 2026-04-02T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.46035
published_at 2026-04-07T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.46088
published_at 2026-04-04T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.46091
published_at 2026-04-08T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.46089
published_at 2026-04-09T12:55:00Z
5
value 0.00259
scoring_system epss
scoring_elements 0.4924
published_at 2026-04-12T12:55:00Z
6
value 0.00259
scoring_system epss
scoring_elements 0.49245
published_at 2026-04-13T12:55:00Z
7
value 0.00259
scoring_system epss
scoring_elements 0.49267
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379031
reference_id 2379031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379031
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:22:48Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
22
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
23
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
24
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
25
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
26
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
27
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
28
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-50106
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbw8-4j9f-eya5
50
url VCID-vpnc-yu7r-bqb6
vulnerability_id VCID-vpnc-yu7r-bqb6
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17036
published_at 2026-04-13T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17169
published_at 2026-04-09T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17144
published_at 2026-04-11T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17096
published_at 2026-04-12T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.1719
published_at 2026-04-02T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17241
published_at 2026-04-04T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17021
published_at 2026-04-07T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17111
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
reference_id 2318526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2024-21208
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpnc-yu7r-bqb6
51
url VCID-wn4r-ugaa-5ydb
vulnerability_id VCID-wn4r-ugaa-5ydb
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46944
published_at 2026-04-13T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46923
published_at 2026-04-02T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.4694
published_at 2026-04-04T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46888
published_at 2026-04-07T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46942
published_at 2026-04-08T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46939
published_at 2026-04-09T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46963
published_at 2026-04-11T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46936
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
reference_id 2257728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-20918
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wn4r-ugaa-5ydb
52
url VCID-x4ms-sbj7-aufu
vulnerability_id VCID-x4ms-sbj7-aufu
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22006.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22006
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35272
published_at 2026-04-02T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.353
published_at 2026-04-04T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35182
published_at 2026-04-07T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35226
published_at 2026-04-08T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35251
published_at 2026-04-09T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35255
published_at 2026-04-11T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3522
published_at 2026-04-12T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35196
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221626
reference_id 2221626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221626
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
27
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
28
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
29
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
30
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
31
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
32
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
33
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
34
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
35
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
36
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-22006
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4ms-sbj7-aufu
53
url VCID-xk2v-7cgk-13ex
vulnerability_id VCID-xk2v-7cgk-13ex
summary OpenJDK: certificate validation issue in TLS session negotiation (8298310)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21967.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21967.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21967
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.2175
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21607
published_at 2026-04-13T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21805
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21556
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21633
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21691
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21702
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21664
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21967
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187704
reference_id 2187704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187704
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2023-21967
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xk2v-7cgk-13ex
54
url VCID-y8bc-k5qu-c7f5
vulnerability_id VCID-y8bc-k5qu-c7f5
summary openjdk: Improve compiler transformations (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30691
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-02T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58814
published_at 2026-04-13T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58827
published_at 2026-04-08T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58833
published_at 2026-04-12T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58851
published_at 2026-04-11T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-04T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58775
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359694
reference_id 2359694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359694
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:24:18Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
25
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
26
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
27
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
28
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
29
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
30
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-30691
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8bc-k5qu-c7f5
55
url VCID-z356-tw9t-q7bp
vulnerability_id VCID-z356-tw9t-q7bp
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34648
published_at 2026-04-13T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34708
published_at 2026-04-09T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-11T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-12T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-02T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34758
published_at 2026-04-04T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34636
published_at 2026-04-07T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
reference_id 2318524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
12
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
13
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
14
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
15
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
16
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
17
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
18
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
19
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
20
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
21
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
22
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
23
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
24
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
25
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
26
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
27
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
28
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
29
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
30
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
31
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
32
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
33
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
34
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2024-21210
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z356-tw9t-q7bp
56
url VCID-zdra-bzqn-4ug9
vulnerability_id VCID-zdra-bzqn-4ug9
summary OpenJDK: integer overflow in C1 compiler address generation (8322122)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-13T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67576
published_at 2026-04-02T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67597
published_at 2026-04-04T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67575
published_at 2026-04-07T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67627
published_at 2026-04-08T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.6764
published_at 2026-04-09T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67663
published_at 2026-04-11T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67648
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
reference_id 2275003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
19
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
21
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
22
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
23
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
24
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
25
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
26
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
27
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
28
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
29
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
30
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
31
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
32
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
33
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
34
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
35
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
36
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
37
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
38
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
39
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
40
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21068
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdra-bzqn-4ug9
57
url VCID-zgpr-3zft-zqgt
vulnerability_id VCID-zgpr-3zft-zqgt
summary OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-13T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-07T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68525
published_at 2026-04-08T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68543
published_at 2026-04-09T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68569
published_at 2026-04-11T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.68556
published_at 2026-04-12T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.68479
published_at 2026-04-02T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68498
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
reference_id 2297963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2024-21140
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgpr-3zft-zqgt
58
url VCID-zkz6-9t74-5bb4
vulnerability_id VCID-zkz6-9t74-5bb4
summary openjdk: Improve scripting supports (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30761.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30761
reference_id
reference_type
scores
0
value 0.00142
scoring_system epss
scoring_elements 0.34495
published_at 2026-04-02T12:55:00Z
1
value 0.00142
scoring_system epss
scoring_elements 0.3439
published_at 2026-04-07T12:55:00Z
2
value 0.00142
scoring_system epss
scoring_elements 0.34522
published_at 2026-04-04T12:55:00Z
3
value 0.00142
scoring_system epss
scoring_elements 0.34432
published_at 2026-04-08T12:55:00Z
4
value 0.00142
scoring_system epss
scoring_elements 0.34462
published_at 2026-04-09T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40633
published_at 2026-04-12T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40614
published_at 2026-04-13T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.4067
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30761
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376786
reference_id 2376786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376786
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-18T14:43:46Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
13
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
14
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
15
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.31~6ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~6ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1
1
url pkg:deb/debian/openjdk-11@11.0.31~10ea-1
purl pkg:deb/debian/openjdk-11@11.0.31~10ea-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1
aliases CVE-2025-30761
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zkz6-9t74-5bb4
Fixing_vulnerabilities
0
url VCID-1d6t-ndfc-m7hg
vulnerability_id VCID-1d6t-ndfc-m7hg
summary OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21443
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18078
published_at 2026-04-13T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18274
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18326
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18029
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18111
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18168
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18174
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18126
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21443
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075793
reference_id 2075793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075793
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21443
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1d6t-ndfc-m7hg
1
url VCID-1nr6-3bq8-nbfn
vulnerability_id VCID-1nr6-3bq8-nbfn
summary
Multiple vulnerabilities have been found in OpenJDK, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2590.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2590
reference_id
reference_type
scores
0
value 0.00449
scoring_system epss
scoring_elements 0.63594
published_at 2026-04-13T12:55:00Z
1
value 0.00449
scoring_system epss
scoring_elements 0.63569
published_at 2026-04-02T12:55:00Z
2
value 0.00449
scoring_system epss
scoring_elements 0.63509
published_at 2026-04-01T12:55:00Z
3
value 0.00449
scoring_system epss
scoring_elements 0.63596
published_at 2026-04-04T12:55:00Z
4
value 0.00449
scoring_system epss
scoring_elements 0.6356
published_at 2026-04-07T12:55:00Z
5
value 0.00449
scoring_system epss
scoring_elements 0.63611
published_at 2026-04-08T12:55:00Z
6
value 0.00449
scoring_system epss
scoring_elements 0.63628
published_at 2026-04-12T12:55:00Z
7
value 0.00449
scoring_system epss
scoring_elements 0.63644
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790556
reference_id 1790556
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790556
11
reference_url https://seclists.org/bugtraq/2020/Feb/22
reference_id 22
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://seclists.org/bugtraq/2020/Feb/22
12
reference_url https://seclists.org/bugtraq/2020/Jan/24
reference_id 24
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://seclists.org/bugtraq/2020/Jan/24
13
reference_url https://www.debian.org/security/2020/dsa-4605
reference_id dsa-4605
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://www.debian.org/security/2020/dsa-4605
14
reference_url https://www.debian.org/security/2020/dsa-4621
reference_id dsa-4621
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://www.debian.org/security/2020/dsa-4621
15
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://security.gentoo.org/glsa/202101-19
16
reference_url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
18
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
reference_id msg00060.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
19
reference_url https://access.redhat.com/errata/RHSA-2020:0122
reference_id RHSA-2020:0122
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://access.redhat.com/errata/RHSA-2020:0122
20
reference_url https://access.redhat.com/errata/RHSA-2020:0128
reference_id RHSA-2020:0128
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://access.redhat.com/errata/RHSA-2020:0128
21
reference_url https://access.redhat.com/errata/RHSA-2020:0157
reference_id RHSA-2020:0157
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://access.redhat.com/errata/RHSA-2020:0157
22
reference_url https://access.redhat.com/errata/RHSA-2020:0196
reference_id RHSA-2020:0196
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://access.redhat.com/errata/RHSA-2020:0196
23
reference_url https://access.redhat.com/errata/RHSA-2020:0202
reference_id RHSA-2020:0202
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://access.redhat.com/errata/RHSA-2020:0202
24
reference_url https://access.redhat.com/errata/RHSA-2020:0231
reference_id RHSA-2020:0231
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://access.redhat.com/errata/RHSA-2020:0231
25
reference_url https://access.redhat.com/errata/RHSA-2020:0232
reference_id RHSA-2020:0232
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://access.redhat.com/errata/RHSA-2020:0232
26
reference_url https://access.redhat.com/errata/RHSA-2020:0541
reference_id RHSA-2020:0541
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://access.redhat.com/errata/RHSA-2020:0541
27
reference_url https://access.redhat.com/errata/RHSA-2020:0632
reference_id RHSA-2020:0632
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://access.redhat.com/errata/RHSA-2020:0632
28
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
29
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
30
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
31
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
32
reference_url https://usn.ubuntu.com/4257-1/
reference_id USN-4257-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/
url https://usn.ubuntu.com/4257-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2590
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1nr6-3bq8-nbfn
2
url VCID-1pdg-7bbt-kqfz
vulnerability_id VCID-1pdg-7bbt-kqfz
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2341
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59239
published_at 2026-04-01T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59349
published_at 2026-04-13T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59313
published_at 2026-04-02T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59337
published_at 2026-04-04T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59301
published_at 2026-04-07T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59352
published_at 2026-04-08T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59365
published_at 2026-04-09T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59384
published_at 2026-04-11T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59367
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1982874
reference_id 1982874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1982874
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
reference_id A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
8
reference_url https://security.archlinux.org/ASA-202107-53
reference_id ASA-202107-53
reference_type
scores
url https://security.archlinux.org/ASA-202107-53
9
reference_url https://security.archlinux.org/ASA-202107-54
reference_id ASA-202107-54
reference_type
scores
url https://security.archlinux.org/ASA-202107-54
10
reference_url https://security.archlinux.org/ASA-202107-65
reference_id ASA-202107-65
reference_type
scores
url https://security.archlinux.org/ASA-202107-65
11
reference_url https://security.archlinux.org/ASA-202107-66
reference_id ASA-202107-66
reference_type
scores
url https://security.archlinux.org/ASA-202107-66
12
reference_url https://security.archlinux.org/AVG-2188
reference_id AVG-2188
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2188
13
reference_url https://security.archlinux.org/AVG-2189
reference_id AVG-2189
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2189
14
reference_url https://security.archlinux.org/AVG-2190
reference_id AVG-2190
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2190
15
reference_url https://www.debian.org/security/2021/dsa-4946
reference_id dsa-4946
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://www.debian.org/security/2021/dsa-4946
16
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://security.gentoo.org/glsa/202209-05
17
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
18
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
reference_id N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
20
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
reference_id PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
22
reference_url https://access.redhat.com/errata/RHSA-2021:2774
reference_id RHSA-2021:2774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2774
23
reference_url https://access.redhat.com/errata/RHSA-2021:2775
reference_id RHSA-2021:2775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2775
24
reference_url https://access.redhat.com/errata/RHSA-2021:2776
reference_id RHSA-2021:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2776
25
reference_url https://access.redhat.com/errata/RHSA-2021:2777
reference_id RHSA-2021:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2777
26
reference_url https://access.redhat.com/errata/RHSA-2021:2778
reference_id RHSA-2021:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2778
27
reference_url https://access.redhat.com/errata/RHSA-2021:2779
reference_id RHSA-2021:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2779
28
reference_url https://access.redhat.com/errata/RHSA-2021:2780
reference_id RHSA-2021:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2780
29
reference_url https://access.redhat.com/errata/RHSA-2021:2781
reference_id RHSA-2021:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2781
30
reference_url https://access.redhat.com/errata/RHSA-2021:2782
reference_id RHSA-2021:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2782
31
reference_url https://access.redhat.com/errata/RHSA-2021:2783
reference_id RHSA-2021:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2783
32
reference_url https://access.redhat.com/errata/RHSA-2021:2784
reference_id RHSA-2021:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2784
33
reference_url https://access.redhat.com/errata/RHSA-2021:2845
reference_id RHSA-2021:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2845
34
reference_url https://access.redhat.com/errata/RHSA-2021:3292
reference_id RHSA-2021:3292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3292
35
reference_url https://access.redhat.com/errata/RHSA-2021:3293
reference_id RHSA-2021:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3293
36
reference_url https://access.redhat.com/errata/RHSA-2021:4089
reference_id RHSA-2021:4089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4089
37
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
reference_id VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-2341
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pdg-7bbt-kqfz
3
url VCID-2ggq-ccut-5ycs
vulnerability_id VCID-2ggq-ccut-5ycs
summary
Multiple vulnerabilities have been found in OpenJDK, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2601.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2601
reference_id
reference_type
scores
0
value 0.00714
scoring_system epss
scoring_elements 0.72283
published_at 2026-04-07T12:55:00Z
1
value 0.00714
scoring_system epss
scoring_elements 0.72307
published_at 2026-04-04T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72281
published_at 2026-04-01T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.72288
published_at 2026-04-02T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72328
published_at 2026-04-13T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72341
published_at 2026-04-12T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.72357
published_at 2026-04-11T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.72334
published_at 2026-04-09T12:55:00Z
8
value 0.00714
scoring_system epss
scoring_elements 0.72322
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790570
reference_id 1790570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790570
11
reference_url https://seclists.org/bugtraq/2020/Feb/22
reference_id 22
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://seclists.org/bugtraq/2020/Feb/22
12
reference_url https://seclists.org/bugtraq/2020/Jan/24
reference_id 24
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://seclists.org/bugtraq/2020/Jan/24
13
reference_url https://www.debian.org/security/2020/dsa-4605
reference_id dsa-4605
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://www.debian.org/security/2020/dsa-4605
14
reference_url https://www.debian.org/security/2020/dsa-4621
reference_id dsa-4621
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://www.debian.org/security/2020/dsa-4621
15
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://security.gentoo.org/glsa/202101-19
16
reference_url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
18
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
reference_id msg00060.html
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
19
reference_url https://access.redhat.com/errata/RHSA-2020:0122
reference_id RHSA-2020:0122
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://access.redhat.com/errata/RHSA-2020:0122
20
reference_url https://access.redhat.com/errata/RHSA-2020:0128
reference_id RHSA-2020:0128
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://access.redhat.com/errata/RHSA-2020:0128
21
reference_url https://access.redhat.com/errata/RHSA-2020:0157
reference_id RHSA-2020:0157
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://access.redhat.com/errata/RHSA-2020:0157
22
reference_url https://access.redhat.com/errata/RHSA-2020:0196
reference_id RHSA-2020:0196
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://access.redhat.com/errata/RHSA-2020:0196
23
reference_url https://access.redhat.com/errata/RHSA-2020:0202
reference_id RHSA-2020:0202
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://access.redhat.com/errata/RHSA-2020:0202
24
reference_url https://access.redhat.com/errata/RHSA-2020:0231
reference_id RHSA-2020:0231
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://access.redhat.com/errata/RHSA-2020:0231
25
reference_url https://access.redhat.com/errata/RHSA-2020:0232
reference_id RHSA-2020:0232
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://access.redhat.com/errata/RHSA-2020:0232
26
reference_url https://access.redhat.com/errata/RHSA-2020:0541
reference_id RHSA-2020:0541
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://access.redhat.com/errata/RHSA-2020:0541
27
reference_url https://access.redhat.com/errata/RHSA-2020:0632
reference_id RHSA-2020:0632
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://access.redhat.com/errata/RHSA-2020:0632
28
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
29
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
30
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
31
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
32
reference_url https://usn.ubuntu.com/4257-1/
reference_id USN-4257-1
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/
url https://usn.ubuntu.com/4257-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2601
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ggq-ccut-5ycs
4
url VCID-2wfy-nmqn-mkfe
vulnerability_id VCID-2wfy-nmqn-mkfe
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2805.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2805.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2805
reference_id
reference_type
scores
0
value 0.01833
scoring_system epss
scoring_elements 0.82902
published_at 2026-04-08T12:55:00Z
1
value 0.01833
scoring_system epss
scoring_elements 0.82877
published_at 2026-04-07T12:55:00Z
2
value 0.01833
scoring_system epss
scoring_elements 0.8288
published_at 2026-04-04T12:55:00Z
3
value 0.01833
scoring_system epss
scoring_elements 0.82917
published_at 2026-04-13T12:55:00Z
4
value 0.01833
scoring_system epss
scoring_elements 0.8292
published_at 2026-04-12T12:55:00Z
5
value 0.01833
scoring_system epss
scoring_elements 0.82851
published_at 2026-04-01T12:55:00Z
6
value 0.01833
scoring_system epss
scoring_elements 0.82925
published_at 2026-04-11T12:55:00Z
7
value 0.01833
scoring_system epss
scoring_elements 0.82867
published_at 2026-04-02T12:55:00Z
8
value 0.01833
scoring_system epss
scoring_elements 0.82909
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
23
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
24
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://www.debian.org/security/2020/dsa-4662
25
reference_url https://www.debian.org/security/2020/dsa-4668
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://www.debian.org/security/2020/dsa-4668
26
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823844
reference_id 1823844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823844
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2805
reference_id CVE-2020-2805
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2805
155
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://security.gentoo.org/glsa/202006-22
156
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://security.gentoo.org/glsa/202209-15
157
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
158
reference_url https://access.redhat.com/errata/RHSA-2020:1507
reference_id RHSA-2020:1507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1507
159
reference_url https://access.redhat.com/errata/RHSA-2020:1508
reference_id RHSA-2020:1508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1508
160
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
161
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
162
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
163
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
164
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
165
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
166
reference_url https://access.redhat.com/errata/RHSA-2020:2236
reference_id RHSA-2020:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2236
167
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
168
reference_url https://access.redhat.com/errata/RHSA-2020:2238
reference_id RHSA-2020:2238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2238
169
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
170
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
171
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2805
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2wfy-nmqn-mkfe
5
url VCID-347b-v3k9-b7cp
vulnerability_id VCID-347b-v3k9-b7cp
summary OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2767.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2767.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2767
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55827
published_at 2026-04-13T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55689
published_at 2026-04-01T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.558
published_at 2026-04-02T12:55:00Z
3
value 0.00328
scoring_system epss
scoring_elements 0.55823
published_at 2026-04-04T12:55:00Z
4
value 0.00328
scoring_system epss
scoring_elements 0.55802
published_at 2026-04-07T12:55:00Z
5
value 0.00328
scoring_system epss
scoring_elements 0.55853
published_at 2026-04-08T12:55:00Z
6
value 0.00328
scoring_system epss
scoring_elements 0.55856
published_at 2026-04-09T12:55:00Z
7
value 0.00328
scoring_system epss
scoring_elements 0.55865
published_at 2026-04-11T12:55:00Z
8
value 0.00328
scoring_system epss
scoring_elements 0.55845
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2767
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
18
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/
url https://www.debian.org/security/2020/dsa-4662
19
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823947
reference_id 1823947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823947
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2767
reference_id CVE-2020-2767
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2767
139
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
140
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
141
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
142
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2767
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-347b-v3k9-b7cp
6
url VCID-39gh-uwky-kke9
vulnerability_id VCID-39gh-uwky-kke9
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2973.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2973.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2973
reference_id
reference_type
scores
0
value 0.00576
scoring_system epss
scoring_elements 0.68794
published_at 2026-04-09T12:55:00Z
1
value 0.00576
scoring_system epss
scoring_elements 0.68802
published_at 2026-04-12T12:55:00Z
2
value 0.00576
scoring_system epss
scoring_elements 0.68725
published_at 2026-04-02T12:55:00Z
3
value 0.00576
scoring_system epss
scoring_elements 0.68816
published_at 2026-04-11T12:55:00Z
4
value 0.00576
scoring_system epss
scoring_elements 0.68706
published_at 2026-04-01T12:55:00Z
5
value 0.00576
scoring_system epss
scoring_elements 0.68745
published_at 2026-04-04T12:55:00Z
6
value 0.00576
scoring_system epss
scoring_elements 0.68723
published_at 2026-04-07T12:55:00Z
7
value 0.00576
scoring_system epss
scoring_elements 0.68774
published_at 2026-04-08T12:55:00Z
8
value 0.00576
scoring_system epss
scoring_elements 0.68773
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2973
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760978
reference_id 1760978
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760978
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2973
reference_id CVE-2019-2973
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2973
70
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
71
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
72
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2019:3134
73
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2019:3135
74
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2019:3136
75
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2019:3157
76
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2019:3158
77
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2019:4109
78
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2019:4110
79
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2019:4113
80
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2019:4115
81
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2020:0006
82
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://access.redhat.com/errata/RHSA-2020:0046
83
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2973
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39gh-uwky-kke9
7
url VCID-3aae-859j-1bg9
vulnerability_id VCID-3aae-859j-1bg9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21293
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26644
published_at 2026-04-02T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26688
published_at 2026-04-04T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26473
published_at 2026-04-07T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26541
published_at 2026-04-08T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.2659
published_at 2026-04-09T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26596
published_at 2026-04-11T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26551
published_at 2026-04-12T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26494
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041417
reference_id 2041417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041417
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21293
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3aae-859j-1bg9
8
url VCID-3b1m-995s-r7a8
vulnerability_id VCID-3b1m-995s-r7a8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2369
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56676
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56788
published_at 2026-04-13T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56771
published_at 2026-04-02T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56791
published_at 2026-04-04T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56768
published_at 2026-04-07T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.5682
published_at 2026-04-08T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56824
published_at 2026-04-09T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56832
published_at 2026-04-11T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56809
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2369
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1982879
reference_id 1982879
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1982879
7
reference_url https://security.archlinux.org/ASA-202107-53
reference_id ASA-202107-53
reference_type
scores
url https://security.archlinux.org/ASA-202107-53
8
reference_url https://security.archlinux.org/ASA-202107-54
reference_id ASA-202107-54
reference_type
scores
url https://security.archlinux.org/ASA-202107-54
9
reference_url https://security.archlinux.org/ASA-202107-65
reference_id ASA-202107-65
reference_type
scores
url https://security.archlinux.org/ASA-202107-65
10
reference_url https://security.archlinux.org/ASA-202107-66
reference_id ASA-202107-66
reference_type
scores
url https://security.archlinux.org/ASA-202107-66
11
reference_url https://security.archlinux.org/AVG-2188
reference_id AVG-2188
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2188
12
reference_url https://security.archlinux.org/AVG-2189
reference_id AVG-2189
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2189
13
reference_url https://security.archlinux.org/AVG-2190
reference_id AVG-2190
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2190
14
reference_url https://www.debian.org/security/2021/dsa-4946
reference_id dsa-4946
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://www.debian.org/security/2021/dsa-4946
15
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://security.gentoo.org/glsa/202209-05
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
18
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
19
reference_url https://access.redhat.com/errata/RHSA-2021:2774
reference_id RHSA-2021:2774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2774
20
reference_url https://access.redhat.com/errata/RHSA-2021:2775
reference_id RHSA-2021:2775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2775
21
reference_url https://access.redhat.com/errata/RHSA-2021:2776
reference_id RHSA-2021:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2776
22
reference_url https://access.redhat.com/errata/RHSA-2021:2777
reference_id RHSA-2021:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2777
23
reference_url https://access.redhat.com/errata/RHSA-2021:2778
reference_id RHSA-2021:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2778
24
reference_url https://access.redhat.com/errata/RHSA-2021:2779
reference_id RHSA-2021:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2779
25
reference_url https://access.redhat.com/errata/RHSA-2021:2780
reference_id RHSA-2021:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2780
26
reference_url https://access.redhat.com/errata/RHSA-2021:2781
reference_id RHSA-2021:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2781
27
reference_url https://access.redhat.com/errata/RHSA-2021:2782
reference_id RHSA-2021:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2782
28
reference_url https://access.redhat.com/errata/RHSA-2021:2783
reference_id RHSA-2021:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2783
29
reference_url https://access.redhat.com/errata/RHSA-2021:2784
reference_id RHSA-2021:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2784
30
reference_url https://access.redhat.com/errata/RHSA-2021:2845
reference_id RHSA-2021:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2845
31
reference_url https://access.redhat.com/errata/RHSA-2021:3292
reference_id RHSA-2021:3292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3292
32
reference_url https://access.redhat.com/errata/RHSA-2021:3293
reference_id RHSA-2021:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3293
33
reference_url https://access.redhat.com/errata/RHSA-2021:4089
reference_id RHSA-2021:4089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4089
34
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-2369
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3b1m-995s-r7a8
9
url VCID-3hj5-z3ck-tkha
vulnerability_id VCID-3hj5-z3ck-tkha
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21365
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041785
reference_id 2041785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041785
19
reference_url https://www.debian.org/security/2022/dsa-5057
reference_id dsa-5057
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://www.debian.org/security/2022/dsa-5057
20
reference_url https://www.debian.org/security/2022/dsa-5058
reference_id dsa-5058
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://www.debian.org/security/2022/dsa-5058
21
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://security.gentoo.org/glsa/202209-05
22
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
23
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
25
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
26
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
27
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
28
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
29
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
30
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
31
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
32
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
33
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
34
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
35
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
36
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
37
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
38
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
39
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
40
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
41
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
42
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
43
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
44
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21365
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hj5-z3ck-tkha
10
url VCID-3v2y-qzfu-nydb
vulnerability_id VCID-3v2y-qzfu-nydb
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14779
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42091
published_at 2026-04-13T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42042
published_at 2026-04-01T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42102
published_at 2026-04-02T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42131
published_at 2026-04-09T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42068
published_at 2026-04-07T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42119
published_at 2026-04-08T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42152
published_at 2026-04-11T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42115
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889271
reference_id 1889271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889271
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
reference_id N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
18
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
reference_id OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
20
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
21
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
22
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
23
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
24
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
25
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
26
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
27
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
28
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
29
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
30
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
31
reference_url https://access.redhat.com/errata/RHSA-2021:0530
reference_id RHSA-2021:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0530
32
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
33
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
reference_id XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
reference_id XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
reference_id YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
reference_id Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14779
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3v2y-qzfu-nydb
11
url VCID-47ae-xdqr-6qgb
vulnerability_id VCID-47ae-xdqr-6qgb
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21540
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.6268
published_at 2026-04-02T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62713
published_at 2026-04-04T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62677
published_at 2026-04-07T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.62728
published_at 2026-04-13T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62745
published_at 2026-04-09T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62763
published_at 2026-04-11T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62752
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21540
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108540
reference_id 2108540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108540
8
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
9
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
10
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
11
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
12
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
13
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
14
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
15
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
16
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
17
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
18
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
19
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
20
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
21
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
22
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
23
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
24
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
25
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
26
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
27
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
28
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
29
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
1
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-21540
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47ae-xdqr-6qgb
12
url VCID-4thy-7844-xuc9
vulnerability_id VCID-4thy-7844-xuc9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21360
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041491
reference_id 2041491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041491
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21360
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4thy-7844-xuc9
13
url VCID-4trq-2j9e-bbfd
vulnerability_id VCID-4trq-2j9e-bbfd
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14577.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14577.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14577
reference_id
reference_type
scores
0
value 0.00283
scoring_system epss
scoring_elements 0.51717
published_at 2026-04-08T12:55:00Z
1
value 0.00283
scoring_system epss
scoring_elements 0.51762
published_at 2026-04-11T12:55:00Z
2
value 0.00283
scoring_system epss
scoring_elements 0.51626
published_at 2026-04-01T12:55:00Z
3
value 0.00283
scoring_system epss
scoring_elements 0.51677
published_at 2026-04-02T12:55:00Z
4
value 0.00283
scoring_system epss
scoring_elements 0.51702
published_at 2026-04-04T12:55:00Z
5
value 0.00283
scoring_system epss
scoring_elements 0.51724
published_at 2026-04-13T12:55:00Z
6
value 0.00283
scoring_system epss
scoring_elements 0.5174
published_at 2026-04-12T12:55:00Z
7
value 0.00283
scoring_system epss
scoring_elements 0.51663
published_at 2026-04-07T12:55:00Z
8
value 0.00283
scoring_system epss
scoring_elements 0.51713
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856988
reference_id 1856988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856988
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://security.gentoo.org/glsa/202209-15
18
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
20
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
21
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
22
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
24
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
26
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
27
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
28
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
29
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
30
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
31
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
32
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
33
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
34
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
35
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
36
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
37
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
38
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
39
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://usn.ubuntu.com/4433-1/
40
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14577
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4trq-2j9e-bbfd
14
url VCID-5wj6-ejpa-3kft
vulnerability_id VCID-5wj6-ejpa-3kft
summary OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2977.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2977.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2977
reference_id
reference_type
scores
0
value 0.00908
scoring_system epss
scoring_elements 0.75776
published_at 2026-04-12T12:55:00Z
1
value 0.00908
scoring_system epss
scoring_elements 0.75713
published_at 2026-04-01T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.75715
published_at 2026-04-02T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75746
published_at 2026-04-04T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75725
published_at 2026-04-07T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75759
published_at 2026-04-08T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.7577
published_at 2026-04-13T12:55:00Z
7
value 0.00908
scoring_system epss
scoring_elements 0.75794
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2977
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/
url https://seclists.org/bugtraq/2019/Oct/31
22
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
23
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/
url https://www.debian.org/security/2019/dsa-4546
24
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1761002
reference_id 1761002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1761002
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2977
reference_id CVE-2019-2977
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2977
41
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
42
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/
url https://access.redhat.com/errata/RHSA-2019:3135
43
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2977
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wj6-ejpa-3kft
15
url VCID-5xg6-kds9-g3hf
vulnerability_id VCID-5xg6-kds9-g3hf
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21294
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21294
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041427
reference_id 2041427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041427
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21294
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xg6-kds9-g3hf
16
url VCID-61c5-8468-33c8
vulnerability_id VCID-61c5-8468-33c8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35565
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35925
published_at 2026-04-01T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.35997
published_at 2026-04-13T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36023
published_at 2026-04-12T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36146
published_at 2026-04-04T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36061
published_at 2026-04-11T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36055
published_at 2026-04-09T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36031
published_at 2026-04-08T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.35982
published_at 2026-04-07T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36116
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014508
reference_id 2014508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014508
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
19
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://www.debian.org/security/2021/dsa-5000
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
38
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
39
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35565
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-61c5-8468-33c8
17
url VCID-64zz-esk6-y3fy
vulnerability_id VCID-64zz-esk6-y3fy
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2988.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2988.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2988
reference_id
reference_type
scores
0
value 0.00514
scoring_system epss
scoring_elements 0.66582
published_at 2026-04-09T12:55:00Z
1
value 0.00514
scoring_system epss
scoring_elements 0.66588
published_at 2026-04-12T12:55:00Z
2
value 0.00514
scoring_system epss
scoring_elements 0.66523
published_at 2026-04-02T12:55:00Z
3
value 0.00514
scoring_system epss
scoring_elements 0.666
published_at 2026-04-11T12:55:00Z
4
value 0.00514
scoring_system epss
scoring_elements 0.66484
published_at 2026-04-01T12:55:00Z
5
value 0.00514
scoring_system epss
scoring_elements 0.66548
published_at 2026-04-04T12:55:00Z
6
value 0.00514
scoring_system epss
scoring_elements 0.66519
published_at 2026-04-07T12:55:00Z
7
value 0.00514
scoring_system epss
scoring_elements 0.66568
published_at 2026-04-08T12:55:00Z
8
value 0.00514
scoring_system epss
scoring_elements 0.66556
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2988
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760999
reference_id 1760999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760999
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2988
reference_id CVE-2019-2988
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2988
68
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
69
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
70
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2019:3134
71
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2019:3135
72
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2019:3136
73
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2019:3157
74
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2019:3158
75
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2019:4109
76
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2019:4110
77
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2019:4113
78
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2019:4115
79
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2020:0006
80
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://access.redhat.com/errata/RHSA-2020:0046
81
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2988
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-64zz-esk6-y3fy
18
url VCID-6wtu-f43b-1ue9
vulnerability_id VCID-6wtu-f43b-1ue9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35559
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30596
published_at 2026-04-07T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30602
published_at 2026-04-13T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30647
published_at 2026-04-12T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30692
published_at 2026-04-11T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30654
published_at 2026-04-08T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30781
published_at 2026-04-04T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30732
published_at 2026-04-02T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30687
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014518
reference_id 2014518
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014518
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
43
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
44
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35559
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wtu-f43b-1ue9
19
url VCID-6ywn-1kuf-1ufb
vulnerability_id VCID-6ywn-1kuf-1ufb
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2754.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2754.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2754
reference_id
reference_type
scores
0
value 0.00217
scoring_system epss
scoring_elements 0.44262
published_at 2026-04-02T12:55:00Z
1
value 0.00217
scoring_system epss
scoring_elements 0.44194
published_at 2026-04-01T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.52767
published_at 2026-04-13T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52738
published_at 2026-04-04T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52703
published_at 2026-04-07T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52754
published_at 2026-04-08T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52749
published_at 2026-04-09T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.528
published_at 2026-04-11T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52783
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2754
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
23
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
24
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url https://www.debian.org/security/2020/dsa-4662
25
reference_url https://www.debian.org/security/2020/dsa-4668
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url https://www.debian.org/security/2020/dsa-4668
26
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823199
reference_id 1823199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823199
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2754
reference_id CVE-2020-2754
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2754
154
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
155
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
156
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
157
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
158
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
159
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
160
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
161
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
162
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
163
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
164
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2754
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ywn-1kuf-1ufb
20
url VCID-6zn4-b8k4-3bcn
vulnerability_id VCID-6zn4-b8k4-3bcn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35586
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37711
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37796
published_at 2026-04-07T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-02T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37812
published_at 2026-04-13T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37837
published_at 2026-04-12T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37874
published_at 2026-04-11T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37859
published_at 2026-04-09T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-08T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015308
reference_id 2015308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015308
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
41
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
42
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
43
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35586
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6zn4-b8k4-3bcn
21
url VCID-74uc-nfy5-fbfx
vulnerability_id VCID-74uc-nfy5-fbfx
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2983.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2983.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2983
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.57071
published_at 2026-04-09T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.57061
published_at 2026-04-12T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.5702
published_at 2026-04-02T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.57082
published_at 2026-04-11T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.56923
published_at 2026-04-01T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.57041
published_at 2026-04-04T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.57018
published_at 2026-04-07T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.57069
published_at 2026-04-08T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.57038
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2983
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1761262
reference_id 1761262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1761262
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2983
reference_id CVE-2019-2983
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2983
68
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
69
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
70
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2019:3134
71
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2019:3135
72
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2019:3136
73
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2019:3157
74
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2019:3158
75
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2019:4109
76
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2019:4110
77
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2019:4113
78
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2019:4115
79
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2020:0006
80
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://access.redhat.com/errata/RHSA-2020:0046
81
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2983
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-74uc-nfy5-fbfx
22
url VCID-7913-mqsn-3bd8
vulnerability_id VCID-7913-mqsn-3bd8
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14796.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14796.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14796
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32741
published_at 2026-04-13T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32743
published_at 2026-04-01T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32874
published_at 2026-04-02T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32909
published_at 2026-04-04T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32729
published_at 2026-04-07T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32777
published_at 2026-04-08T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32803
published_at 2026-04-09T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32805
published_at 2026-04-11T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32767
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14796
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889697
reference_id 1889697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889697
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
28
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
29
reference_url https://access.redhat.com/errata/RHSA-2021:0530
reference_id RHSA-2021:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0530
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14796
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7913-mqsn-3bd8
23
url VCID-7c1s-f99n-bfds
vulnerability_id VCID-7c1s-f99n-bfds
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14581.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14581
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59719
published_at 2026-04-09T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59706
published_at 2026-04-08T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59587
published_at 2026-04-01T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59684
published_at 2026-04-04T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59654
published_at 2026-04-07T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.5966
published_at 2026-04-02T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.59703
published_at 2026-04-13T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.59722
published_at 2026-04-12T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59738
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1857172
reference_id 1857172
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1857172
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://security.gentoo.org/glsa/202209-15
18
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
20
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
21
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
22
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
24
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
26
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://usn.ubuntu.com/4433-1/
27
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14581
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7c1s-f99n-bfds
24
url VCID-8fmy-hu1v-nqct
vulnerability_id VCID-8fmy-hu1v-nqct
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2756.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2756.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2756
reference_id
reference_type
scores
0
value 0.0026
scoring_system epss
scoring_elements 0.49433
published_at 2026-04-08T12:55:00Z
1
value 0.0026
scoring_system epss
scoring_elements 0.49379
published_at 2026-04-07T12:55:00Z
2
value 0.0026
scoring_system epss
scoring_elements 0.49425
published_at 2026-04-04T12:55:00Z
3
value 0.0026
scoring_system epss
scoring_elements 0.4942
published_at 2026-04-13T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49417
published_at 2026-04-12T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.4937
published_at 2026-04-01T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49446
published_at 2026-04-11T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49398
published_at 2026-04-02T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49428
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
20
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
24
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
25
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://www.debian.org/security/2020/dsa-4662
26
reference_url https://www.debian.org/security/2020/dsa-4668
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://www.debian.org/security/2020/dsa-4668
27
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823215
reference_id 1823215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823215
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2756
reference_id CVE-2020-2756
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2756
164
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://security.gentoo.org/glsa/202006-22
165
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://security.gentoo.org/glsa/202209-15
166
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
167
reference_url https://access.redhat.com/errata/RHSA-2020:1507
reference_id RHSA-2020:1507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1507
168
reference_url https://access.redhat.com/errata/RHSA-2020:1508
reference_id RHSA-2020:1508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1508
169
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
170
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
171
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
172
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
173
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
174
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
175
reference_url https://access.redhat.com/errata/RHSA-2020:2236
reference_id RHSA-2020:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2236
176
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
177
reference_url https://access.redhat.com/errata/RHSA-2020:2238
reference_id RHSA-2020:2238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2238
178
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
179
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
180
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2756
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fmy-hu1v-nqct
25
url VCID-93n5-e3u3-kugs
vulnerability_id VCID-93n5-e3u3-kugs
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2987.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2987.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2987
reference_id
reference_type
scores
0
value 0.00711
scoring_system epss
scoring_elements 0.7225
published_at 2026-04-13T12:55:00Z
1
value 0.00711
scoring_system epss
scoring_elements 0.72207
published_at 2026-04-01T12:55:00Z
2
value 0.00711
scoring_system epss
scoring_elements 0.72212
published_at 2026-04-02T12:55:00Z
3
value 0.00711
scoring_system epss
scoring_elements 0.72232
published_at 2026-04-04T12:55:00Z
4
value 0.00711
scoring_system epss
scoring_elements 0.72208
published_at 2026-04-07T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.72245
published_at 2026-04-08T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72257
published_at 2026-04-09T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.7228
published_at 2026-04-11T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72264
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2987
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1761149
reference_id 1761149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1761149
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2987
reference_id CVE-2019-2987
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2987
46
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
47
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
48
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://access.redhat.com/errata/RHSA-2019:3134
49
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://access.redhat.com/errata/RHSA-2019:3135
50
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://access.redhat.com/errata/RHSA-2019:3136
51
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://access.redhat.com/errata/RHSA-2019:3157
52
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://access.redhat.com/errata/RHSA-2019:3158
53
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2987
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-93n5-e3u3-kugs
26
url VCID-95d9-a86j-tkdy
vulnerability_id VCID-95d9-a86j-tkdy
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2773.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2773.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2773
reference_id
reference_type
scores
0
value 0.00771
scoring_system epss
scoring_elements 0.73527
published_at 2026-04-08T12:55:00Z
1
value 0.00771
scoring_system epss
scoring_elements 0.73491
published_at 2026-04-07T12:55:00Z
2
value 0.00771
scoring_system epss
scoring_elements 0.73519
published_at 2026-04-04T12:55:00Z
3
value 0.00771
scoring_system epss
scoring_elements 0.73539
published_at 2026-04-13T12:55:00Z
4
value 0.00771
scoring_system epss
scoring_elements 0.73547
published_at 2026-04-12T12:55:00Z
5
value 0.00771
scoring_system epss
scoring_elements 0.73488
published_at 2026-04-01T12:55:00Z
6
value 0.00771
scoring_system epss
scoring_elements 0.73564
published_at 2026-04-11T12:55:00Z
7
value 0.00771
scoring_system epss
scoring_elements 0.73496
published_at 2026-04-02T12:55:00Z
8
value 0.00771
scoring_system epss
scoring_elements 0.73541
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2773
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
20
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
24
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
25
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://www.debian.org/security/2020/dsa-4662
26
reference_url https://www.debian.org/security/2020/dsa-4668
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://www.debian.org/security/2020/dsa-4668
27
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823224
reference_id 1823224
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823224
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2773
reference_id CVE-2020-2773
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2773
167
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://security.gentoo.org/glsa/202006-22
168
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://security.gentoo.org/glsa/202209-15
169
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
170
reference_url https://access.redhat.com/errata/RHSA-2020:1507
reference_id RHSA-2020:1507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1507
171
reference_url https://access.redhat.com/errata/RHSA-2020:1508
reference_id RHSA-2020:1508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1508
172
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
173
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
174
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
175
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
176
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
177
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
178
reference_url https://access.redhat.com/errata/RHSA-2021:0717
reference_id RHSA-2021:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0717
179
reference_url https://access.redhat.com/errata/RHSA-2021:0736
reference_id RHSA-2021:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0736
180
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2773
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95d9-a86j-tkdy
27
url VCID-97bv-kegv-uyd9
vulnerability_id VCID-97bv-kegv-uyd9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35567
reference_id
reference_type
scores
0
value 0.0022
scoring_system epss
scoring_elements 0.44539
published_at 2026-04-01T12:55:00Z
1
value 0.0022
scoring_system epss
scoring_elements 0.44618
published_at 2026-04-13T12:55:00Z
2
value 0.0022
scoring_system epss
scoring_elements 0.44617
published_at 2026-04-12T12:55:00Z
3
value 0.0022
scoring_system epss
scoring_elements 0.44638
published_at 2026-04-04T12:55:00Z
4
value 0.0022
scoring_system epss
scoring_elements 0.44576
published_at 2026-04-07T12:55:00Z
5
value 0.0022
scoring_system epss
scoring_elements 0.44628
published_at 2026-04-08T12:55:00Z
6
value 0.0022
scoring_system epss
scoring_elements 0.4463
published_at 2026-04-09T12:55:00Z
7
value 0.0022
scoring_system epss
scoring_elements 0.44647
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015658
reference_id 2015658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015658
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35567
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97bv-kegv-uyd9
28
url VCID-98bc-5jrc-5kas
vulnerability_id VCID-98bc-5jrc-5kas
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21341
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041897
reference_id 2041897
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041897
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21341
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-98bc-5jrc-5kas
29
url VCID-a129-wbcc-yqec
vulnerability_id VCID-a129-wbcc-yqec
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2755.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2755.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2755
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43242
published_at 2026-04-08T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.4319
published_at 2026-04-07T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43253
published_at 2026-04-04T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43228
published_at 2026-04-13T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43243
published_at 2026-04-12T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43168
published_at 2026-04-01T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43275
published_at 2026-04-11T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43224
published_at 2026-04-02T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43254
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2755
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
23
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
24
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://www.debian.org/security/2020/dsa-4662
25
reference_url https://www.debian.org/security/2020/dsa-4668
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://www.debian.org/security/2020/dsa-4668
26
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823200
reference_id 1823200
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823200
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2755
reference_id CVE-2020-2755
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2755
162
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://security.gentoo.org/glsa/202006-22
163
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://security.gentoo.org/glsa/202209-15
164
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
165
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
166
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
167
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
168
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
169
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
170
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
171
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
172
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
173
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
174
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2755
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a129-wbcc-yqec
30
url VCID-a95g-84vs-xbav
vulnerability_id VCID-a95g-84vs-xbav
summary OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21476
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-13T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40224
published_at 2026-04-11T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40186
published_at 2026-04-12T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40824
published_at 2026-04-09T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40815
published_at 2026-04-02T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40842
published_at 2026-04-04T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40767
published_at 2026-04-07T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40817
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010597
reference_id 1010597
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010597
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075842
reference_id 2075842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075842
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
15
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
16
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
17
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
18
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
19
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
20
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
21
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
22
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
23
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
24
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
25
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
26
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
27
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
28
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
29
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
30
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
31
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
32
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
33
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
34
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
35
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
36
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
37
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21476
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a95g-84vs-xbav
31
url VCID-cena-jspa-2ba7
vulnerability_id VCID-cena-jspa-2ba7
summary OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2816.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2816.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2816
reference_id
reference_type
scores
0
value 0.00708
scoring_system epss
scoring_elements 0.72183
published_at 2026-04-13T12:55:00Z
1
value 0.00708
scoring_system epss
scoring_elements 0.72139
published_at 2026-04-01T12:55:00Z
2
value 0.00708
scoring_system epss
scoring_elements 0.72144
published_at 2026-04-02T12:55:00Z
3
value 0.00708
scoring_system epss
scoring_elements 0.72164
published_at 2026-04-04T12:55:00Z
4
value 0.00708
scoring_system epss
scoring_elements 0.72142
published_at 2026-04-07T12:55:00Z
5
value 0.00708
scoring_system epss
scoring_elements 0.72179
published_at 2026-04-08T12:55:00Z
6
value 0.00708
scoring_system epss
scoring_elements 0.72191
published_at 2026-04-09T12:55:00Z
7
value 0.00708
scoring_system epss
scoring_elements 0.72213
published_at 2026-04-11T12:55:00Z
8
value 0.00708
scoring_system epss
scoring_elements 0.72197
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2816
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
18
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/
url https://www.debian.org/security/2020/dsa-4662
19
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823853
reference_id 1823853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823853
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2816
reference_id CVE-2020-2816
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2816
138
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
139
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
140
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
141
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2816
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cena-jspa-2ba7
32
url VCID-chp9-6c8n-xufp
vulnerability_id VCID-chp9-6c8n-xufp
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2981.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2981.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2981
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.56024
published_at 2026-04-01T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.5616
published_at 2026-04-13T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56176
published_at 2026-04-12T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.562
published_at 2026-04-11T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.5619
published_at 2026-04-09T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56184
published_at 2026-04-08T12:55:00Z
6
value 0.00333
scoring_system epss
scoring_elements 0.56133
published_at 2026-04-07T12:55:00Z
7
value 0.00333
scoring_system epss
scoring_elements 0.56154
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2981
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760980
reference_id 1760980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760980
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2981
reference_id CVE-2019-2981
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2981
68
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
69
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
70
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2019:3134
71
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2019:3135
72
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2019:3136
73
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2019:3157
74
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2019:3158
75
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2019:4109
76
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2019:4110
77
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2019:4113
78
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2019:4115
79
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2020:0006
80
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://access.redhat.com/errata/RHSA-2020:0046
81
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2981
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chp9-6c8n-xufp
33
url VCID-d6wf-827v-a7c3
vulnerability_id VCID-d6wf-827v-a7c3
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14798.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14798
reference_id
reference_type
scores
0
value 0.00244
scoring_system epss
scoring_elements 0.47633
published_at 2026-04-13T12:55:00Z
1
value 0.00244
scoring_system epss
scoring_elements 0.47564
published_at 2026-04-01T12:55:00Z
2
value 0.00244
scoring_system epss
scoring_elements 0.47603
published_at 2026-04-02T12:55:00Z
3
value 0.00244
scoring_system epss
scoring_elements 0.47624
published_at 2026-04-12T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-07T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.47628
published_at 2026-04-08T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47648
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1891135
reference_id 1891135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1891135
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
19
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14798
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d6wf-827v-a7c3
34
url VCID-ey12-2uq3-6bar
vulnerability_id VCID-ey12-2uq3-6bar
summary
Multiple vulnerabilities have been found in OpenJDK, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2654.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2654.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2654
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.56709
published_at 2026-04-13T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.56689
published_at 2026-04-07T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56593
published_at 2026-04-01T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.5671
published_at 2026-04-04T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56741
published_at 2026-04-08T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56745
published_at 2026-04-09T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.56754
published_at 2026-04-11T12:55:00Z
7
value 0.00339
scoring_system epss
scoring_elements 0.5673
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2654
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791217
reference_id 1791217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791217
11
reference_url https://seclists.org/bugtraq/2020/Feb/22
reference_id 22
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://seclists.org/bugtraq/2020/Feb/22
12
reference_url https://seclists.org/bugtraq/2020/Jan/24
reference_id 24
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://seclists.org/bugtraq/2020/Jan/24
13
reference_url https://www.debian.org/security/2020/dsa-4605
reference_id dsa-4605
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://www.debian.org/security/2020/dsa-4605
14
reference_url https://www.debian.org/security/2020/dsa-4621
reference_id dsa-4621
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://www.debian.org/security/2020/dsa-4621
15
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://security.gentoo.org/glsa/202101-19
16
reference_url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
18
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
reference_id msg00060.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
19
reference_url https://access.redhat.com/errata/RHSA-2020:0122
reference_id RHSA-2020:0122
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://access.redhat.com/errata/RHSA-2020:0122
20
reference_url https://access.redhat.com/errata/RHSA-2020:0128
reference_id RHSA-2020:0128
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://access.redhat.com/errata/RHSA-2020:0128
21
reference_url https://access.redhat.com/errata/RHSA-2020:0157
reference_id RHSA-2020:0157
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://access.redhat.com/errata/RHSA-2020:0157
22
reference_url https://access.redhat.com/errata/RHSA-2020:0196
reference_id RHSA-2020:0196
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://access.redhat.com/errata/RHSA-2020:0196
23
reference_url https://access.redhat.com/errata/RHSA-2020:0202
reference_id RHSA-2020:0202
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://access.redhat.com/errata/RHSA-2020:0202
24
reference_url https://access.redhat.com/errata/RHSA-2020:0231
reference_id RHSA-2020:0231
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://access.redhat.com/errata/RHSA-2020:0231
25
reference_url https://access.redhat.com/errata/RHSA-2020:0232
reference_id RHSA-2020:0232
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://access.redhat.com/errata/RHSA-2020:0232
26
reference_url https://access.redhat.com/errata/RHSA-2020:0541
reference_id RHSA-2020:0541
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://access.redhat.com/errata/RHSA-2020:0541
27
reference_url https://access.redhat.com/errata/RHSA-2020:0632
reference_id RHSA-2020:0632
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://access.redhat.com/errata/RHSA-2020:0632
28
reference_url https://access.redhat.com/errata/RHSA-2020:2236
reference_id RHSA-2020:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2236
29
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
30
reference_url https://access.redhat.com/errata/RHSA-2020:2238
reference_id RHSA-2020:2238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2238
31
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
32
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
33
reference_url https://usn.ubuntu.com/4257-1/
reference_id USN-4257-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/
url https://usn.ubuntu.com/4257-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2654
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ey12-2uq3-6bar
35
url VCID-g2fj-4mgh-23fs
vulnerability_id VCID-g2fj-4mgh-23fs
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21283
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30894
published_at 2026-04-04T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30847
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32867
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32868
published_at 2026-04-11T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32829
published_at 2026-04-12T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32803
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.3279
published_at 2026-04-07T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32838
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041400
reference_id 2041400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041400
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21283
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2fj-4mgh-23fs
36
url VCID-gfxx-m9ud-rybe
vulnerability_id VCID-gfxx-m9ud-rybe
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14562.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14562.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14562
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55641
published_at 2026-04-13T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.55501
published_at 2026-04-01T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55613
published_at 2026-04-02T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55638
published_at 2026-04-04T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55615
published_at 2026-04-07T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55666
published_at 2026-04-08T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.5567
published_at 2026-04-09T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55678
published_at 2026-04-11T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55659
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14562
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856810
reference_id 1856810
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856810
14
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://www.debian.org/security/2020/dsa-4734
15
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://security.gentoo.org/glsa/202008-24
16
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://security.gentoo.org/glsa/202209-15
17
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
19
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
20
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
21
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
23
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
24
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
25
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
26
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
27
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://usn.ubuntu.com/4433-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14562
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfxx-m9ud-rybe
37
url VCID-gksn-mb6g-rue5
vulnerability_id VCID-gksn-mb6g-rue5
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35556
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33383
published_at 2026-04-01T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.3341
published_at 2026-04-13T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33437
published_at 2026-04-08T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33471
published_at 2026-04-09T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33474
published_at 2026-04-11T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33433
published_at 2026-04-12T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33519
published_at 2026-04-02T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33552
published_at 2026-04-04T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33392
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014515
reference_id 2014515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014515
14
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
15
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
16
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
17
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
18
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
19
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
20
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
21
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
22
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
23
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
24
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
25
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
26
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
27
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
28
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
29
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
30
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
31
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
32
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
33
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
34
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
35
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
36
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
37
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35556
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gksn-mb6g-rue5
38
url VCID-hdz7-kcy9-juah
vulnerability_id VCID-hdz7-kcy9-juah
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35564
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28817
published_at 2026-04-01T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28773
published_at 2026-04-13T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-11T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28862
published_at 2026-04-09T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28755
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28948
published_at 2026-04-04T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28898
published_at 2026-04-02T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28822
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35564
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015061
reference_id 2015061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015061
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
43
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
44
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35564
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz7-kcy9-juah
39
url VCID-he8f-erpk-sqh8
vulnerability_id VCID-he8f-erpk-sqh8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38981
published_at 2026-04-01T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39155
published_at 2026-04-12T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39136
published_at 2026-04-13T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39189
published_at 2026-04-04T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-07T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39163
published_at 2026-04-08T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.3918
published_at 2026-04-09T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39192
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
reference_id 2014524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
43
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
44
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35561
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-he8f-erpk-sqh8
40
url VCID-hg8h-z7af-pqe3
vulnerability_id VCID-hg8h-z7af-pqe3
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2999.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2999.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2999
reference_id
reference_type
scores
0
value 0.01308
scoring_system epss
scoring_elements 0.79785
published_at 2026-04-09T12:55:00Z
1
value 0.01308
scoring_system epss
scoring_elements 0.79791
published_at 2026-04-12T12:55:00Z
2
value 0.01308
scoring_system epss
scoring_elements 0.79742
published_at 2026-04-02T12:55:00Z
3
value 0.01308
scoring_system epss
scoring_elements 0.79807
published_at 2026-04-11T12:55:00Z
4
value 0.01308
scoring_system epss
scoring_elements 0.79734
published_at 2026-04-01T12:55:00Z
5
value 0.01308
scoring_system epss
scoring_elements 0.79763
published_at 2026-04-04T12:55:00Z
6
value 0.01308
scoring_system epss
scoring_elements 0.79749
published_at 2026-04-07T12:55:00Z
7
value 0.01308
scoring_system epss
scoring_elements 0.79778
published_at 2026-04-08T12:55:00Z
8
value 0.01308
scoring_system epss
scoring_elements 0.79784
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2999
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760992
reference_id 1760992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760992
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2999
reference_id CVE-2019-2999
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2999
68
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
69
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
70
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2019:3134
71
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2019:3135
72
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2019:3136
73
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2019:3157
74
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2019:3158
75
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2019:4109
76
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2019:4110
77
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2019:4113
78
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2019:4115
79
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2020:0006
80
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://access.redhat.com/errata/RHSA-2020:0046
81
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2999
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hg8h-z7af-pqe3
41
url VCID-hmzc-b2h5-ryh2
vulnerability_id VCID-hmzc-b2h5-ryh2
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2800.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2800.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2800
reference_id
reference_type
scores
0
value 0.00576
scoring_system epss
scoring_elements 0.68797
published_at 2026-04-08T12:55:00Z
1
value 0.00576
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-07T12:55:00Z
2
value 0.00576
scoring_system epss
scoring_elements 0.68768
published_at 2026-04-04T12:55:00Z
3
value 0.00576
scoring_system epss
scoring_elements 0.68796
published_at 2026-04-13T12:55:00Z
4
value 0.00576
scoring_system epss
scoring_elements 0.68728
published_at 2026-04-01T12:55:00Z
5
value 0.00576
scoring_system epss
scoring_elements 0.68825
published_at 2026-04-12T12:55:00Z
6
value 0.00576
scoring_system epss
scoring_elements 0.68839
published_at 2026-04-11T12:55:00Z
7
value 0.00576
scoring_system epss
scoring_elements 0.68747
published_at 2026-04-02T12:55:00Z
8
value 0.00576
scoring_system epss
scoring_elements 0.68816
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2800
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
23
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
24
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://www.debian.org/security/2020/dsa-4662
25
reference_url https://www.debian.org/security/2020/dsa-4668
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://www.debian.org/security/2020/dsa-4668
26
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823527
reference_id 1823527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823527
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2800
reference_id CVE-2020-2800
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2800
155
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://security.gentoo.org/glsa/202006-22
156
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://security.gentoo.org/glsa/202209-15
157
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
158
reference_url https://access.redhat.com/errata/RHSA-2020:1507
reference_id RHSA-2020:1507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1507
159
reference_url https://access.redhat.com/errata/RHSA-2020:1508
reference_id RHSA-2020:1508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1508
160
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
161
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
162
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
163
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
164
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
165
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
166
reference_url https://access.redhat.com/errata/RHSA-2020:2236
reference_id RHSA-2020:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2236
167
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
168
reference_url https://access.redhat.com/errata/RHSA-2020:2238
reference_id RHSA-2020:2238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2238
169
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
170
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
171
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2800
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hmzc-b2h5-ryh2
42
url VCID-htq1-a17u-4bh3
vulnerability_id VCID-htq1-a17u-4bh3
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2803.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2803.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2803
reference_id
reference_type
scores
0
value 0.03262
scoring_system epss
scoring_elements 0.87133
published_at 2026-04-08T12:55:00Z
1
value 0.03262
scoring_system epss
scoring_elements 0.87113
published_at 2026-04-07T12:55:00Z
2
value 0.03262
scoring_system epss
scoring_elements 0.8712
published_at 2026-04-04T12:55:00Z
3
value 0.03262
scoring_system epss
scoring_elements 0.87144
published_at 2026-04-13T12:55:00Z
4
value 0.03262
scoring_system epss
scoring_elements 0.87092
published_at 2026-04-01T12:55:00Z
5
value 0.03262
scoring_system epss
scoring_elements 0.87148
published_at 2026-04-12T12:55:00Z
6
value 0.03262
scoring_system epss
scoring_elements 0.87154
published_at 2026-04-11T12:55:00Z
7
value 0.03262
scoring_system epss
scoring_elements 0.87103
published_at 2026-04-02T12:55:00Z
8
value 0.03262
scoring_system epss
scoring_elements 0.87141
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
23
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
24
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://www.debian.org/security/2020/dsa-4662
25
reference_url https://www.debian.org/security/2020/dsa-4668
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://www.debian.org/security/2020/dsa-4668
26
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823694
reference_id 1823694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823694
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2803
reference_id CVE-2020-2803
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2803
155
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://security.gentoo.org/glsa/202006-22
156
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://security.gentoo.org/glsa/202209-15
157
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
158
reference_url https://access.redhat.com/errata/RHSA-2020:1507
reference_id RHSA-2020:1507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1507
159
reference_url https://access.redhat.com/errata/RHSA-2020:1508
reference_id RHSA-2020:1508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1508
160
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
161
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
162
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
163
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
164
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
165
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
166
reference_url https://access.redhat.com/errata/RHSA-2020:2236
reference_id RHSA-2020:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2236
167
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
168
reference_url https://access.redhat.com/errata/RHSA-2020:2238
reference_id RHSA-2020:2238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2238
169
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
170
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
171
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2803
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htq1-a17u-4bh3
43
url VCID-hx4c-96gx-2fbq
vulnerability_id VCID-hx4c-96gx-2fbq
summary OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21426
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19319
published_at 2026-04-08T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19476
published_at 2026-04-02T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19268
published_at 2026-04-13T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19326
published_at 2026-04-12T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19374
published_at 2026-04-11T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19371
published_at 2026-04-09T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19524
published_at 2026-04-04T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.1924
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075788
reference_id 2075788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075788
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
39
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
40
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
41
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
42
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21426
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hx4c-96gx-2fbq
44
url VCID-jc9v-4116-4yas
vulnerability_id VCID-jc9v-4116-4yas
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14781.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14781
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27914
published_at 2026-04-13T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27973
published_at 2026-04-12T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.28109
published_at 2026-04-04T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.28012
published_at 2026-04-09T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27971
published_at 2026-04-08T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27904
published_at 2026-04-07T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.28015
published_at 2026-04-11T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27995
published_at 2026-04-01T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.28067
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889274
reference_id 1889274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889274
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
28
reference_url https://access.redhat.com/errata/RHSA-2021:0717
reference_id RHSA-2021:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0717
29
reference_url https://access.redhat.com/errata/RHSA-2021:0736
reference_id RHSA-2021:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0736
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14781
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jc9v-4116-4yas
45
url VCID-jr6p-7nkg-1fe9
vulnerability_id VCID-jr6p-7nkg-1fe9
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2962.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2962.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2962
reference_id
reference_type
scores
0
value 0.00476
scoring_system epss
scoring_elements 0.64877
published_at 2026-04-09T12:55:00Z
1
value 0.00476
scoring_system epss
scoring_elements 0.64884
published_at 2026-04-12T12:55:00Z
2
value 0.00476
scoring_system epss
scoring_elements 0.64822
published_at 2026-04-02T12:55:00Z
3
value 0.00476
scoring_system epss
scoring_elements 0.64894
published_at 2026-04-11T12:55:00Z
4
value 0.00476
scoring_system epss
scoring_elements 0.64771
published_at 2026-04-01T12:55:00Z
5
value 0.00476
scoring_system epss
scoring_elements 0.64849
published_at 2026-04-04T12:55:00Z
6
value 0.00476
scoring_system epss
scoring_elements 0.64812
published_at 2026-04-07T12:55:00Z
7
value 0.00476
scoring_system epss
scoring_elements 0.64862
published_at 2026-04-08T12:55:00Z
8
value 0.00476
scoring_system epss
scoring_elements 0.64857
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2962
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1761266
reference_id 1761266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1761266
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2962
reference_id CVE-2019-2962
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2962
68
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
69
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
70
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2019:3134
71
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2019:3135
72
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2019:3136
73
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2019:3157
74
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2019:3158
75
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2019:4109
76
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2019:4110
77
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2019:4113
78
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2019:4115
79
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2020:0006
80
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://access.redhat.com/errata/RHSA-2020:0046
81
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2962
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jr6p-7nkg-1fe9
46
url VCID-k3xn-hbrs-nkab
vulnerability_id VCID-k3xn-hbrs-nkab
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14583.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14583.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14583
reference_id
reference_type
scores
0
value 0.01018
scoring_system epss
scoring_elements 0.77205
published_at 2026-04-09T12:55:00Z
1
value 0.01018
scoring_system epss
scoring_elements 0.77197
published_at 2026-04-08T12:55:00Z
2
value 0.01018
scoring_system epss
scoring_elements 0.77164
published_at 2026-04-07T12:55:00Z
3
value 0.01018
scoring_system epss
scoring_elements 0.77182
published_at 2026-04-04T12:55:00Z
4
value 0.01018
scoring_system epss
scoring_elements 0.77146
published_at 2026-04-01T12:55:00Z
5
value 0.01018
scoring_system epss
scoring_elements 0.77153
published_at 2026-04-02T12:55:00Z
6
value 0.01018
scoring_system epss
scoring_elements 0.77208
published_at 2026-04-13T12:55:00Z
7
value 0.01018
scoring_system epss
scoring_elements 0.77212
published_at 2026-04-12T12:55:00Z
8
value 0.01018
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14583
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856448
reference_id 1856448
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856448
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
22
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
25
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
27
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
28
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
29
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
30
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
31
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
32
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
33
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
34
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
35
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
36
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
37
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
38
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
39
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
40
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://usn.ubuntu.com/4433-1/
41
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14583
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3xn-hbrs-nkab
47
url VCID-kd25-3buc-cqdy
vulnerability_id VCID-kd25-3buc-cqdy
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2978.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2978.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2978
reference_id
reference_type
scores
0
value 0.00476
scoring_system epss
scoring_elements 0.6489
published_at 2026-04-09T12:55:00Z
1
value 0.00476
scoring_system epss
scoring_elements 0.64898
published_at 2026-04-12T12:55:00Z
2
value 0.00476
scoring_system epss
scoring_elements 0.64836
published_at 2026-04-02T12:55:00Z
3
value 0.00476
scoring_system epss
scoring_elements 0.64907
published_at 2026-04-11T12:55:00Z
4
value 0.00476
scoring_system epss
scoring_elements 0.64786
published_at 2026-04-01T12:55:00Z
5
value 0.00476
scoring_system epss
scoring_elements 0.64863
published_at 2026-04-04T12:55:00Z
6
value 0.00476
scoring_system epss
scoring_elements 0.64826
published_at 2026-04-07T12:55:00Z
7
value 0.00476
scoring_system epss
scoring_elements 0.64876
published_at 2026-04-08T12:55:00Z
8
value 0.00476
scoring_system epss
scoring_elements 0.6487
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2978
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1761006
reference_id 1761006
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1761006
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2978
reference_id CVE-2019-2978
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2978
70
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
71
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
72
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2019:3134
73
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2019:3135
74
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2019:3136
75
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2019:3157
76
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2019:3158
77
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2019:4109
78
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2019:4110
79
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2019:4113
80
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2019:4115
81
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2020:0006
82
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://access.redhat.com/errata/RHSA-2020:0046
83
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2978
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kd25-3buc-cqdy
48
url VCID-m3j8-8gff-6fg4
vulnerability_id VCID-m3j8-8gff-6fg4
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14792.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14792
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40442
published_at 2026-04-13T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.4038
published_at 2026-04-01T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-02T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40493
published_at 2026-04-04T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-07T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40466
published_at 2026-04-08T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40477
published_at 2026-04-09T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40498
published_at 2026-04-11T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40461
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889280
reference_id 1889280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889280
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
28
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14792
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3j8-8gff-6fg4
49
url VCID-mh6k-v939-m7hj
vulnerability_id VCID-mh6k-v939-m7hj
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14803.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14803
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12245
published_at 2026-04-13T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12218
published_at 2026-04-01T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12333
published_at 2026-04-02T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12379
published_at 2026-04-04T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12181
published_at 2026-04-07T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12261
published_at 2026-04-08T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12311
published_at 2026-04-09T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12319
published_at 2026-04-11T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12283
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14803
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889895
reference_id 1889895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889895
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2021:0717
reference_id RHSA-2021:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0717
28
reference_url https://access.redhat.com/errata/RHSA-2021:0733
reference_id RHSA-2021:0733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0733
29
reference_url https://access.redhat.com/errata/RHSA-2021:0736
reference_id RHSA-2021:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0736
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14803
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mh6k-v939-m7hj
50
url VCID-mumk-x95v-bfc8
vulnerability_id VCID-mumk-x95v-bfc8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21366
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.3747
published_at 2026-04-04T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37445
published_at 2026-04-02T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75391
published_at 2026-04-09T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-11T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-12T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75378
published_at 2026-04-13T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-07T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041789
reference_id 2041789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041789
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21366
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mumk-x95v-bfc8
51
url VCID-muvh-c3he-1bax
vulnerability_id VCID-muvh-c3he-1bax
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2894.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2894.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2894
reference_id
reference_type
scores
0
value 0.0058
scoring_system epss
scoring_elements 0.68884
published_at 2026-04-13T12:55:00Z
1
value 0.0058
scoring_system epss
scoring_elements 0.68816
published_at 2026-04-01T12:55:00Z
2
value 0.0058
scoring_system epss
scoring_elements 0.68834
published_at 2026-04-02T12:55:00Z
3
value 0.0058
scoring_system epss
scoring_elements 0.68855
published_at 2026-04-04T12:55:00Z
4
value 0.0058
scoring_system epss
scoring_elements 0.68835
published_at 2026-04-07T12:55:00Z
5
value 0.0058
scoring_system epss
scoring_elements 0.68885
published_at 2026-04-08T12:55:00Z
6
value 0.0058
scoring_system epss
scoring_elements 0.68904
published_at 2026-04-09T12:55:00Z
7
value 0.0058
scoring_system epss
scoring_elements 0.68927
published_at 2026-04-11T12:55:00Z
8
value 0.0058
scoring_system epss
scoring_elements 0.68913
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
23
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
24
reference_url https://minerva.crocs.fi.muni.cz/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url https://minerva.crocs.fi.muni.cz/
25
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url https://seclists.org/bugtraq/2019/Oct/27
26
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url https://seclists.org/bugtraq/2019/Oct/31
27
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
28
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url https://www.debian.org/security/2019/dsa-4546
29
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url https://www.debian.org/security/2019/dsa-4548
30
reference_url http://www.openwall.com/lists/oss-security/2019/10/02/2
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url http://www.openwall.com/lists/oss-security/2019/10/02/2
31
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1777985
reference_id 1777985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1777985
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2894
reference_id CVE-2019-2894
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2894
59
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2894
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-muvh-c3he-1bax
52
url VCID-mwfy-hus1-37gt
vulnerability_id VCID-mwfy-hus1-37gt
summary
Multiple vulnerabilities have been found in OpenJDK, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2593.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2593
reference_id
reference_type
scores
0
value 0.0064
scoring_system epss
scoring_elements 0.70491
published_at 2026-04-02T12:55:00Z
1
value 0.0064
scoring_system epss
scoring_elements 0.70542
published_at 2026-04-13T12:55:00Z
2
value 0.0064
scoring_system epss
scoring_elements 0.70556
published_at 2026-04-12T12:55:00Z
3
value 0.0064
scoring_system epss
scoring_elements 0.70571
published_at 2026-04-11T12:55:00Z
4
value 0.0064
scoring_system epss
scoring_elements 0.70548
published_at 2026-04-09T12:55:00Z
5
value 0.0064
scoring_system epss
scoring_elements 0.70532
published_at 2026-04-08T12:55:00Z
6
value 0.0064
scoring_system epss
scoring_elements 0.70486
published_at 2026-04-07T12:55:00Z
7
value 0.0064
scoring_system epss
scoring_elements 0.70509
published_at 2026-04-04T12:55:00Z
8
value 0.0064
scoring_system epss
scoring_elements 0.70477
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2593
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790884
reference_id 1790884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790884
12
reference_url https://seclists.org/bugtraq/2020/Feb/22
reference_id 22
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://seclists.org/bugtraq/2020/Feb/22
13
reference_url https://seclists.org/bugtraq/2020/Jan/24
reference_id 24
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://seclists.org/bugtraq/2020/Jan/24
14
reference_url https://www.debian.org/security/2020/dsa-4605
reference_id dsa-4605
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://www.debian.org/security/2020/dsa-4605
15
reference_url https://www.debian.org/security/2020/dsa-4621
reference_id dsa-4621
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://www.debian.org/security/2020/dsa-4621
16
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://security.gentoo.org/glsa/202101-19
17
reference_url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
18
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
19
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
reference_id msg00060.html
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
20
reference_url https://access.redhat.com/errata/RHSA-2020:0122
reference_id RHSA-2020:0122
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0122
21
reference_url https://access.redhat.com/errata/RHSA-2020:0128
reference_id RHSA-2020:0128
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0128
22
reference_url https://access.redhat.com/errata/RHSA-2020:0157
reference_id RHSA-2020:0157
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0157
23
reference_url https://access.redhat.com/errata/RHSA-2020:0196
reference_id RHSA-2020:0196
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0196
24
reference_url https://access.redhat.com/errata/RHSA-2020:0202
reference_id RHSA-2020:0202
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0202
25
reference_url https://access.redhat.com/errata/RHSA-2020:0231
reference_id RHSA-2020:0231
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0231
26
reference_url https://access.redhat.com/errata/RHSA-2020:0232
reference_id RHSA-2020:0232
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0232
27
reference_url https://access.redhat.com/errata/RHSA-2020:0465
reference_id RHSA-2020:0465
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0465
28
reference_url https://access.redhat.com/errata/RHSA-2020:0467
reference_id RHSA-2020:0467
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0467
29
reference_url https://access.redhat.com/errata/RHSA-2020:0468
reference_id RHSA-2020:0468
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0468
30
reference_url https://access.redhat.com/errata/RHSA-2020:0469
reference_id RHSA-2020:0469
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0469
31
reference_url https://access.redhat.com/errata/RHSA-2020:0470
reference_id RHSA-2020:0470
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0470
32
reference_url https://access.redhat.com/errata/RHSA-2020:0541
reference_id RHSA-2020:0541
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0541
33
reference_url https://access.redhat.com/errata/RHSA-2020:0632
reference_id RHSA-2020:0632
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://access.redhat.com/errata/RHSA-2020:0632
34
reference_url https://access.redhat.com/errata/RHSA-2020:0856
reference_id RHSA-2020:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0856
35
reference_url https://usn.ubuntu.com/4257-1/
reference_id USN-4257-1
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/
url https://usn.ubuntu.com/4257-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2593
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwfy-hus1-37gt
53
url VCID-ne6z-gg9f-qkcy
vulnerability_id VCID-ne6z-gg9f-qkcy
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21282
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.33007
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.33041
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32871
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32918
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3295
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32912
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32887
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21282
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041435
reference_id 2041435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041435
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21282
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ne6z-gg9f-qkcy
54
url VCID-nw7e-6j5f-ebfa
vulnerability_id VCID-nw7e-6j5f-ebfa
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2992.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2992.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2992
reference_id
reference_type
scores
0
value 0.00898
scoring_system epss
scoring_elements 0.75585
published_at 2026-04-01T12:55:00Z
1
value 0.00898
scoring_system epss
scoring_elements 0.75649
published_at 2026-04-12T12:55:00Z
2
value 0.00898
scoring_system epss
scoring_elements 0.75668
published_at 2026-04-11T12:55:00Z
3
value 0.00898
scoring_system epss
scoring_elements 0.75643
published_at 2026-04-13T12:55:00Z
4
value 0.00898
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-08T12:55:00Z
5
value 0.00898
scoring_system epss
scoring_elements 0.75598
published_at 2026-04-07T12:55:00Z
6
value 0.00898
scoring_system epss
scoring_elements 0.75587
published_at 2026-04-02T12:55:00Z
7
value 0.00898
scoring_system epss
scoring_elements 0.75618
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1761146
reference_id 1761146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1761146
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2992
reference_id CVE-2019-2992
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2992
68
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
69
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
70
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2019:3134
71
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2019:3135
72
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2019:3136
73
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2019:3157
74
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2019:3158
75
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2019:4109
76
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2019:4110
77
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2019:4113
78
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2019:4115
79
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2020:0006
80
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://access.redhat.com/errata/RHSA-2020:0046
81
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2992
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw7e-6j5f-ebfa
55
url VCID-p5ye-19wy-ayb8
vulnerability_id VCID-p5ye-19wy-ayb8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31435
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31432
published_at 2026-04-07T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.3157
published_at 2026-04-02T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.3144
published_at 2026-04-13T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-12T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-11T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31514
published_at 2026-04-09T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31485
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31613
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
reference_id 2015311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
41
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
42
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
43
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35603
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ye-19wy-ayb8
56
url VCID-psrh-rb6j-afh7
vulnerability_id VCID-psrh-rb6j-afh7
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2830.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2830.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2830
reference_id
reference_type
scores
0
value 0.00222
scoring_system epss
scoring_elements 0.44857
published_at 2026-04-13T12:55:00Z
1
value 0.00222
scoring_system epss
scoring_elements 0.44773
published_at 2026-04-01T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44854
published_at 2026-04-02T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44875
published_at 2026-04-04T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44815
published_at 2026-04-07T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44867
published_at 2026-04-08T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.44869
published_at 2026-04-09T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44886
published_at 2026-04-11T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44855
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2830
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10318
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10318
20
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
24
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
25
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://www.debian.org/security/2020/dsa-4662
26
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823542
reference_id 1823542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823542
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2830
reference_id CVE-2020-2830
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2830
159
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://security.gentoo.org/glsa/202006-22
160
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
161
reference_url https://access.redhat.com/errata/RHSA-2020:1507
reference_id RHSA-2020:1507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1507
162
reference_url https://access.redhat.com/errata/RHSA-2020:1508
reference_id RHSA-2020:1508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1508
163
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
164
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
165
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
166
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
167
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
168
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
169
reference_url https://access.redhat.com/errata/RHSA-2020:2236
reference_id RHSA-2020:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2236
170
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
171
reference_url https://access.redhat.com/errata/RHSA-2020:2238
reference_id RHSA-2020:2238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2238
172
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
173
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
174
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2830
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-psrh-rb6j-afh7
57
url VCID-rfs8-njaq-qkc8
vulnerability_id VCID-rfs8-njaq-qkc8
summary
Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.

A fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.
references
0
reference_url http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-34169
reference_id
reference_type
scores
0
value 0.06658
scoring_system epss
scoring_elements 0.91212
published_at 2026-04-11T12:55:00Z
1
value 0.06658
scoring_system epss
scoring_elements 0.91206
published_at 2026-04-09T12:55:00Z
2
value 0.06658
scoring_system epss
scoring_elements 0.91199
published_at 2026-04-08T12:55:00Z
3
value 0.06658
scoring_system epss
scoring_elements 0.91186
published_at 2026-04-07T12:55:00Z
4
value 0.06658
scoring_system epss
scoring_elements 0.91216
published_at 2026-04-12T12:55:00Z
5
value 0.06658
scoring_system epss
scoring_elements 0.91215
published_at 2026-04-13T12:55:00Z
6
value 0.08992
scoring_system epss
scoring_elements 0.92592
published_at 2026-04-04T12:55:00Z
7
value 0.08992
scoring_system epss
scoring_elements 0.92585
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-34169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git
9
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
10
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
11
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
12
reference_url https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
13
reference_url https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
14
reference_url https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
15
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-34169
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-34169
29
reference_url https://security.gentoo.org/glsa/202401-25
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202401-25
30
reference_url https://security.netapp.com/advisory/ntap-20220729-0009
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220729-0009
31
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
32
reference_url https://www.debian.org/security/2022/dsa-5188
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5188
33
reference_url https://www.debian.org/security/2022/dsa-5192
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5192
34
reference_url https://www.debian.org/security/2022/dsa-5256
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5256
35
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
36
reference_url https://xalan.apache.org
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://xalan.apache.org
37
reference_url http://www.openwall.com/lists/oss-security/2022/07/19/5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/19/5
38
reference_url http://www.openwall.com/lists/oss-security/2022/07/19/6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/19/6
39
reference_url http://www.openwall.com/lists/oss-security/2022/07/20/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/20/2
40
reference_url http://www.openwall.com/lists/oss-security/2022/07/20/3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/20/3
41
reference_url http://www.openwall.com/lists/oss-security/2022/10/18/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/18/2
42
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/11/04/8
43
reference_url http://www.openwall.com/lists/oss-security/2022/11/07/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/11/07/2
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860
reference_id 1015860
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108554
reference_id 2108554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108554
46
reference_url https://github.com/advisories/GHSA-9339-86wc-4qgf
reference_id GHSA-9339-86wc-4qgf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9339-86wc-4qgf
47
reference_url https://security.gentoo.org/glsa/202405-16
reference_id GLSA-202405-16
reference_type
scores
url https://security.gentoo.org/glsa/202405-16
48
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
49
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
50
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
51
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
52
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
53
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
54
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
55
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
56
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
57
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
58
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
59
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
60
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
61
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
62
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
63
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
64
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
65
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
66
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
67
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
68
reference_url https://access.redhat.com/errata/RHSA-2024:3708
reference_id RHSA-2024:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3708
69
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
70
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
1
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-34169, GHSA-9339-86wc-4qgf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfs8-njaq-qkc8
58
url VCID-rgbz-akft-f7e6
vulnerability_id VCID-rgbz-akft-f7e6
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21296
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.33007
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.33041
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32871
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32918
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3295
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32912
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32887
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21296
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041439
reference_id 2041439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041439
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21296
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-akft-f7e6
59
url VCID-rmqx-pseh-q7a7
vulnerability_id VCID-rmqx-pseh-q7a7
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35550
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23084
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23142
published_at 2026-04-13T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23201
published_at 2026-04-12T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23303
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23092
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23259
published_at 2026-04-02T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23238
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23217
published_at 2026-04-09T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23166
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35550
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015648
reference_id 2015648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015648
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
19
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://www.debian.org/security/2021/dsa-5000
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35550
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmqx-pseh-q7a7
60
url VCID-rpdj-d7je-47cs
vulnerability_id VCID-rpdj-d7je-47cs
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14573.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14573
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59737
published_at 2026-04-13T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59693
published_at 2026-04-02T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59621
published_at 2026-04-01T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59717
published_at 2026-04-04T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59687
published_at 2026-04-07T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59739
published_at 2026-04-08T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.59752
published_at 2026-04-09T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.59771
published_at 2026-04-11T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59756
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856951
reference_id 1856951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856951
14
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://www.debian.org/security/2020/dsa-4734
15
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://security.gentoo.org/glsa/202008-24
16
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://security.gentoo.org/glsa/202209-15
17
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
19
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
20
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
21
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
23
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
24
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
25
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
26
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
27
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://usn.ubuntu.com/4433-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14573
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rpdj-d7je-47cs
61
url VCID-s4d4-pvtj-8ucp
vulnerability_id VCID-s4d4-pvtj-8ucp
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2781.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2781.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2781
reference_id
reference_type
scores
0
value 0.00255
scoring_system epss
scoring_elements 0.48901
published_at 2026-04-08T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48847
published_at 2026-04-07T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.48893
published_at 2026-04-04T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48897
published_at 2026-04-13T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.4883
published_at 2026-04-01T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.48889
published_at 2026-04-12T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48915
published_at 2026-04-11T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.48867
published_at 2026-04-02T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.48898
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2781
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10318
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10318
20
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
24
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
25
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://www.debian.org/security/2020/dsa-4662
26
reference_url https://www.debian.org/security/2020/dsa-4668
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://www.debian.org/security/2020/dsa-4668
27
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823960
reference_id 1823960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823960
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:-:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:-:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix2:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix3:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:-:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:hotfix1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:hotfix1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:hotfix1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:-:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:hotfix1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:hotfix1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:hotfix1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2781
reference_id CVE-2020-2781
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2781
174
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://security.gentoo.org/glsa/202006-22
175
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://security.gentoo.org/glsa/202209-15
176
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
177
reference_url https://access.redhat.com/errata/RHSA-2020:1507
reference_id RHSA-2020:1507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1507
178
reference_url https://access.redhat.com/errata/RHSA-2020:1508
reference_id RHSA-2020:1508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1508
179
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
180
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
181
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
182
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
183
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
184
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
185
reference_url https://access.redhat.com/errata/RHSA-2020:2236
reference_id RHSA-2020:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2236
186
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
187
reference_url https://access.redhat.com/errata/RHSA-2020:2238
reference_id RHSA-2020:2238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2238
188
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
189
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
190
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2781
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4d4-pvtj-8ucp
62
url VCID-shg1-t3nh-67hk
vulnerability_id VCID-shg1-t3nh-67hk
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21305
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45854
published_at 2026-04-02T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45875
published_at 2026-04-04T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45825
published_at 2026-04-07T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45881
published_at 2026-04-08T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45878
published_at 2026-04-09T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.459
published_at 2026-04-11T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.4587
published_at 2026-04-12T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45877
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21305
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041878
reference_id 2041878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041878
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21305
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shg1-t3nh-67hk
63
url VCID-spnj-gvva-efet
vulnerability_id VCID-spnj-gvva-efet
summary
Multiple vulnerabilities have been found in OpenJDK, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2604.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2604
reference_id
reference_type
scores
0
value 0.01699
scoring_system epss
scoring_elements 0.82282
published_at 2026-04-13T12:55:00Z
1
value 0.01699
scoring_system epss
scoring_elements 0.82225
published_at 2026-04-02T12:55:00Z
2
value 0.01699
scoring_system epss
scoring_elements 0.82212
published_at 2026-04-01T12:55:00Z
3
value 0.01699
scoring_system epss
scoring_elements 0.82245
published_at 2026-04-04T12:55:00Z
4
value 0.01699
scoring_system epss
scoring_elements 0.8224
published_at 2026-04-07T12:55:00Z
5
value 0.01699
scoring_system epss
scoring_elements 0.82267
published_at 2026-04-08T12:55:00Z
6
value 0.01699
scoring_system epss
scoring_elements 0.82274
published_at 2026-04-09T12:55:00Z
7
value 0.01699
scoring_system epss
scoring_elements 0.82294
published_at 2026-04-11T12:55:00Z
8
value 0.01699
scoring_system epss
scoring_elements 0.82288
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790944
reference_id 1790944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790944
12
reference_url https://seclists.org/bugtraq/2020/Feb/22
reference_id 22
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://seclists.org/bugtraq/2020/Feb/22
13
reference_url https://www.debian.org/security/2020/dsa-4621
reference_id dsa-4621
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://www.debian.org/security/2020/dsa-4621
14
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://security.gentoo.org/glsa/202101-19
15
reference_url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
reference_id msg00060.html
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
18
reference_url https://access.redhat.com/errata/RHSA-2020:0122
reference_id RHSA-2020:0122
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0122
19
reference_url https://access.redhat.com/errata/RHSA-2020:0128
reference_id RHSA-2020:0128
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0128
20
reference_url https://access.redhat.com/errata/RHSA-2020:0157
reference_id RHSA-2020:0157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0157
21
reference_url https://access.redhat.com/errata/RHSA-2020:0196
reference_id RHSA-2020:0196
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0196
22
reference_url https://access.redhat.com/errata/RHSA-2020:0202
reference_id RHSA-2020:0202
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0202
23
reference_url https://access.redhat.com/errata/RHSA-2020:0231
reference_id RHSA-2020:0231
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0231
24
reference_url https://access.redhat.com/errata/RHSA-2020:0232
reference_id RHSA-2020:0232
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0232
25
reference_url https://access.redhat.com/errata/RHSA-2020:0465
reference_id RHSA-2020:0465
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0465
26
reference_url https://access.redhat.com/errata/RHSA-2020:0467
reference_id RHSA-2020:0467
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0467
27
reference_url https://access.redhat.com/errata/RHSA-2020:0468
reference_id RHSA-2020:0468
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0468
28
reference_url https://access.redhat.com/errata/RHSA-2020:0469
reference_id RHSA-2020:0469
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0469
29
reference_url https://access.redhat.com/errata/RHSA-2020:0470
reference_id RHSA-2020:0470
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0470
30
reference_url https://access.redhat.com/errata/RHSA-2020:0541
reference_id RHSA-2020:0541
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0541
31
reference_url https://access.redhat.com/errata/RHSA-2020:0632
reference_id RHSA-2020:0632
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://access.redhat.com/errata/RHSA-2020:0632
32
reference_url https://access.redhat.com/errata/RHSA-2020:0856
reference_id RHSA-2020:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0856
33
reference_url https://usn.ubuntu.com/4257-1/
reference_id USN-4257-1
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/
url https://usn.ubuntu.com/4257-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2604
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-spnj-gvva-efet
64
url VCID-t4r8-ujpb-5kdk
vulnerability_id VCID-t4r8-ujpb-5kdk
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21541
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60711
published_at 2026-04-02T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-13T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60741
published_at 2026-04-04T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60706
published_at 2026-04-07T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60755
published_at 2026-04-08T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.6077
published_at 2026-04-09T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60795
published_at 2026-04-11T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60781
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108543
reference_id 2108543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108543
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
reference_id H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
reference_id I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
reference_id JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
reference_id KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
reference_id L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
13
reference_url https://security.netapp.com/advisory/ntap-20220729-0009/
reference_id ntap-20220729-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://security.netapp.com/advisory/ntap-20220729-0009/
14
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
15
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
16
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
17
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
18
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
19
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
20
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
21
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
22
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
23
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
24
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
25
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
26
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
27
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
28
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
29
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
30
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
31
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
32
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
33
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
34
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
35
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
reference_id YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
1
url pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
purl pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-4snj-etwf-eqe8
3
vulnerability VCID-6196-gvhx-ruh8
4
vulnerability VCID-9n5v-4daz-eyc2
5
vulnerability VCID-apsn-z1br-3bdy
6
vulnerability VCID-b32x-4pu4-jkh4
7
vulnerability VCID-duy9-6f1p-vqah
8
vulnerability VCID-e6dm-6767-9kdk
9
vulnerability VCID-mt9c-tby1-wqe9
10
vulnerability VCID-ntga-y6cv-a3df
11
vulnerability VCID-nxx8-nehy-qyhg
12
vulnerability VCID-p9na-7jta-9yg4
13
vulnerability VCID-u81s-cs95-4yhx
14
vulnerability VCID-vbw8-4j9f-eya5
15
vulnerability VCID-vpnc-yu7r-bqb6
16
vulnerability VCID-y8bc-k5qu-c7f5
17
vulnerability VCID-z356-tw9t-q7bp
18
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1
aliases CVE-2022-21541
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4r8-ujpb-5kdk
65
url VCID-tekc-e66p-tyba
vulnerability_id VCID-tekc-e66p-tyba
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14556.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14556
reference_id
reference_type
scores
0
value 0.00576
scoring_system epss
scoring_elements 0.68816
published_at 2026-04-09T12:55:00Z
1
value 0.00576
scoring_system epss
scoring_elements 0.68797
published_at 2026-04-08T12:55:00Z
2
value 0.00576
scoring_system epss
scoring_elements 0.68728
published_at 2026-04-01T12:55:00Z
3
value 0.00576
scoring_system epss
scoring_elements 0.68768
published_at 2026-04-04T12:55:00Z
4
value 0.00576
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-07T12:55:00Z
5
value 0.00576
scoring_system epss
scoring_elements 0.68747
published_at 2026-04-02T12:55:00Z
6
value 0.00576
scoring_system epss
scoring_elements 0.68796
published_at 2026-04-13T12:55:00Z
7
value 0.00576
scoring_system epss
scoring_elements 0.68825
published_at 2026-04-12T12:55:00Z
8
value 0.00576
scoring_system epss
scoring_elements 0.68839
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856896
reference_id 1856896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856896
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
22
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
25
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
27
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
28
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
29
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
30
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
31
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
32
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
33
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
34
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
35
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
36
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
37
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
38
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://usn.ubuntu.com/4433-1/
39
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14556
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tekc-e66p-tyba
66
url VCID-tkw1-8js4-h7cw
vulnerability_id VCID-tkw1-8js4-h7cw
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2949.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2949.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2949
reference_id
reference_type
scores
0
value 0.00551
scoring_system epss
scoring_elements 0.67974
published_at 2026-04-13T12:55:00Z
1
value 0.00551
scoring_system epss
scoring_elements 0.67913
published_at 2026-04-01T12:55:00Z
2
value 0.00551
scoring_system epss
scoring_elements 0.67936
published_at 2026-04-02T12:55:00Z
3
value 0.00551
scoring_system epss
scoring_elements 0.67955
published_at 2026-04-04T12:55:00Z
4
value 0.00551
scoring_system epss
scoring_elements 0.67934
published_at 2026-04-07T12:55:00Z
5
value 0.00551
scoring_system epss
scoring_elements 0.67985
published_at 2026-04-08T12:55:00Z
6
value 0.00551
scoring_system epss
scoring_elements 0.67998
published_at 2026-04-09T12:55:00Z
7
value 0.00551
scoring_system epss
scoring_elements 0.68021
published_at 2026-04-11T12:55:00Z
8
value 0.00551
scoring_system epss
scoring_elements 0.68008
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2949
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
23
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
24
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://seclists.org/bugtraq/2019/Oct/27
25
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://seclists.org/bugtraq/2019/Oct/31
26
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
27
reference_url https://support.f5.com/csp/article/K54213762?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://support.f5.com/csp/article/K54213762?utm_source=f5support&amp%3Butm_medium=RSS
28
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://www.debian.org/security/2019/dsa-4546
29
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://www.debian.org/security/2019/dsa-4548
30
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1761594
reference_id 1761594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1761594
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2949
reference_id CVE-2019-2949
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2949
69
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
70
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
71
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://access.redhat.com/errata/RHSA-2019:3134
72
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://access.redhat.com/errata/RHSA-2019:3135
73
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://access.redhat.com/errata/RHSA-2019:3136
74
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
75
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
76
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
77
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2949
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tkw1-8js4-h7cw
67
url VCID-tna8-m3b1-nkhn
vulnerability_id VCID-tna8-m3b1-nkhn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21291
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.32057
published_at 2026-04-04T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.32017
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32861
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-11T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32824
published_at 2026-04-12T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32799
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32785
published_at 2026-04-07T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32832
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21291
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041831
reference_id 2041831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041831
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21291
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tna8-m3b1-nkhn
68
url VCID-tpng-ppye-m7hv
vulnerability_id VCID-tpng-ppye-m7hv
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14579.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14579.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14579
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36656
published_at 2026-04-13T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36617
published_at 2026-04-01T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36773
published_at 2026-04-02T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36804
published_at 2026-04-04T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.3664
published_at 2026-04-07T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36691
published_at 2026-04-08T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36708
published_at 2026-04-09T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36717
published_at 2026-04-11T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36682
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14579
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856995
reference_id 1856995
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856995
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
22
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
23
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
24
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
25
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
26
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
27
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
28
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
29
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
30
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
31
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
32
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14579
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tpng-ppye-m7hv
69
url VCID-tr4r-wm4s-auej
vulnerability_id VCID-tr4r-wm4s-auej
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21340
reference_id
reference_type
scores
0
value 0.06446
scoring_system epss
scoring_elements 0.91022
published_at 2026-04-02T12:55:00Z
1
value 0.06446
scoring_system epss
scoring_elements 0.91031
published_at 2026-04-04T12:55:00Z
2
value 0.06446
scoring_system epss
scoring_elements 0.9104
published_at 2026-04-07T12:55:00Z
3
value 0.06446
scoring_system epss
scoring_elements 0.91052
published_at 2026-04-08T12:55:00Z
4
value 0.06446
scoring_system epss
scoring_elements 0.91059
published_at 2026-04-09T12:55:00Z
5
value 0.06446
scoring_system epss
scoring_elements 0.91067
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041884
reference_id 2041884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041884
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21340
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tr4r-wm4s-auej
70
url VCID-u9xe-x4f1-9fc8
vulnerability_id VCID-u9xe-x4f1-9fc8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2163
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26911
published_at 2026-04-01T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26795
published_at 2026-04-13T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2695
published_at 2026-04-02T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26986
published_at 2026-04-04T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26777
published_at 2026-04-07T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26846
published_at 2026-04-08T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26893
published_at 2026-04-09T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26896
published_at 2026-04-11T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26852
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2163
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951217
reference_id 1951217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951217
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
reference_id 5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
6
reference_url https://security.archlinux.org/AVG-1847
reference_id AVG-1847
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1847
7
reference_url https://security.archlinux.org/AVG-1848
reference_id AVG-1848
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1848
8
reference_url https://security.archlinux.org/AVG-1849
reference_id AVG-1849
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1849
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
reference_id CFXOKM2233JVGYDOWW77BN54X3GZTIBK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
reference_id CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
11
reference_url https://www.debian.org/security/2021/dsa-4899
reference_id dsa-4899
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://www.debian.org/security/2021/dsa-4899
12
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://security.gentoo.org/glsa/202209-05
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
reference_id MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
14
reference_url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
reference_id MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
16
reference_url https://security.netapp.com/advisory/ntap-20210513-0001/
reference_id ntap-20210513-0001
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://security.netapp.com/advisory/ntap-20210513-0001/
17
reference_url https://access.redhat.com/errata/RHSA-2021:1297
reference_id RHSA-2021:1297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1297
18
reference_url https://access.redhat.com/errata/RHSA-2021:1298
reference_id RHSA-2021:1298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1298
19
reference_url https://access.redhat.com/errata/RHSA-2021:1299
reference_id RHSA-2021:1299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1299
20
reference_url https://access.redhat.com/errata/RHSA-2021:1301
reference_id RHSA-2021:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1301
21
reference_url https://access.redhat.com/errata/RHSA-2021:1305
reference_id RHSA-2021:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1305
22
reference_url https://access.redhat.com/errata/RHSA-2021:1306
reference_id RHSA-2021:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1306
23
reference_url https://access.redhat.com/errata/RHSA-2021:1307
reference_id RHSA-2021:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1307
24
reference_url https://access.redhat.com/errata/RHSA-2021:1315
reference_id RHSA-2021:1315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1315
25
reference_url https://access.redhat.com/errata/RHSA-2021:1444
reference_id RHSA-2021:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1444
26
reference_url https://access.redhat.com/errata/RHSA-2021:1445
reference_id RHSA-2021:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1445
27
reference_url https://access.redhat.com/errata/RHSA-2021:1446
reference_id RHSA-2021:1446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1446
28
reference_url https://access.redhat.com/errata/RHSA-2021:1447
reference_id RHSA-2021:1447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1447
29
reference_url https://access.redhat.com/errata/RHSA-2022:6735
reference_id RHSA-2022:6735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6735
30
reference_url https://access.redhat.com/errata/RHSA-2022:6755
reference_id RHSA-2022:6755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6755
31
reference_url https://access.redhat.com/errata/RHSA-2022:6756
reference_id RHSA-2022:6756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6756
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
reference_id UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
33
reference_url https://usn.ubuntu.com/4892-1/
reference_id USN-4892-1
reference_type
scores
url https://usn.ubuntu.com/4892-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-2163
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9xe-x4f1-9fc8
71
url VCID-upb2-1jmf-3udy
vulnerability_id VCID-upb2-1jmf-3udy
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14797.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14797
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35695
published_at 2026-04-13T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35582
published_at 2026-04-01T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35778
published_at 2026-04-02T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35805
published_at 2026-04-04T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35685
published_at 2026-04-07T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35731
published_at 2026-04-08T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35754
published_at 2026-04-09T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35763
published_at 2026-04-11T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35718
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14797
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889717
reference_id 1889717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889717
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
28
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
29
reference_url https://access.redhat.com/errata/RHSA-2021:0530
reference_id RHSA-2021:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0530
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14797
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upb2-1jmf-3udy
72
url VCID-vssb-tgq1-p3g8
vulnerability_id VCID-vssb-tgq1-p3g8
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14782.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14782
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34766
published_at 2026-04-13T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34634
published_at 2026-04-01T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34849
published_at 2026-04-02T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34876
published_at 2026-04-04T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34751
published_at 2026-04-07T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34795
published_at 2026-04-08T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34824
published_at 2026-04-09T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34829
published_at 2026-04-11T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34791
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889290
reference_id 1889290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889290
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
28
reference_url https://access.redhat.com/errata/RHSA-2021:0717
reference_id RHSA-2021:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0717
29
reference_url https://access.redhat.com/errata/RHSA-2021:0736
reference_id RHSA-2021:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0736
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14782
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vssb-tgq1-p3g8
73
url VCID-wfjr-ddp6-mkd5
vulnerability_id VCID-wfjr-ddp6-mkd5
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14621.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14621
reference_id
reference_type
scores
0
value 0.00461
scoring_system epss
scoring_elements 0.64165
published_at 2026-04-09T12:55:00Z
1
value 0.00461
scoring_system epss
scoring_elements 0.64149
published_at 2026-04-08T12:55:00Z
2
value 0.00461
scoring_system epss
scoring_elements 0.64098
published_at 2026-04-07T12:55:00Z
3
value 0.00461
scoring_system epss
scoring_elements 0.64139
published_at 2026-04-04T12:55:00Z
4
value 0.00461
scoring_system epss
scoring_elements 0.64112
published_at 2026-04-02T12:55:00Z
5
value 0.00461
scoring_system epss
scoring_elements 0.64138
published_at 2026-04-13T12:55:00Z
6
value 0.00461
scoring_system epss
scoring_elements 0.64166
published_at 2026-04-12T12:55:00Z
7
value 0.00461
scoring_system epss
scoring_elements 0.64177
published_at 2026-04-11T12:55:00Z
8
value 0.00461
scoring_system epss
scoring_elements 0.64055
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14621
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856885
reference_id 1856885
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856885
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
22
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
25
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
27
reference_url https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E
reference_id rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E
28
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
29
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
30
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
31
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
32
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
33
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
34
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
35
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
36
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
37
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
38
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
39
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
40
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
41
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://usn.ubuntu.com/4433-1/
42
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14621
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfjr-ddp6-mkd5
74
url VCID-wrfc-9msj-hqbc
vulnerability_id VCID-wrfc-9msj-hqbc
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2757.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2757.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2757
reference_id
reference_type
scores
0
value 0.0026
scoring_system epss
scoring_elements 0.49433
published_at 2026-04-08T12:55:00Z
1
value 0.0026
scoring_system epss
scoring_elements 0.49379
published_at 2026-04-07T12:55:00Z
2
value 0.0026
scoring_system epss
scoring_elements 0.49425
published_at 2026-04-04T12:55:00Z
3
value 0.0026
scoring_system epss
scoring_elements 0.4942
published_at 2026-04-13T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49417
published_at 2026-04-12T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.4937
published_at 2026-04-01T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49446
published_at 2026-04-11T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49398
published_at 2026-04-02T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49428
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2757
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10332
20
reference_url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
24
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
25
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://www.debian.org/security/2020/dsa-4662
26
reference_url https://www.debian.org/security/2020/dsa-4668
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://www.debian.org/security/2020/dsa-4668
27
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823216
reference_id 1823216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823216
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2757
reference_id CVE-2020-2757
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2757
165
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://security.gentoo.org/glsa/202006-22
166
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://security.gentoo.org/glsa/202209-15
167
reference_url https://access.redhat.com/errata/RHSA-2020:1506
reference_id RHSA-2020:1506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1506
168
reference_url https://access.redhat.com/errata/RHSA-2020:1507
reference_id RHSA-2020:1507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1507
169
reference_url https://access.redhat.com/errata/RHSA-2020:1508
reference_id RHSA-2020:1508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1508
170
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
171
reference_url https://access.redhat.com/errata/RHSA-2020:1512
reference_id RHSA-2020:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1512
172
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
173
reference_url https://access.redhat.com/errata/RHSA-2020:1515
reference_id RHSA-2020:1515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1515
174
reference_url https://access.redhat.com/errata/RHSA-2020:1516
reference_id RHSA-2020:1516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1516
175
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
176
reference_url https://access.redhat.com/errata/RHSA-2020:2236
reference_id RHSA-2020:2236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2236
177
reference_url https://access.redhat.com/errata/RHSA-2020:2237
reference_id RHSA-2020:2237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2237
178
reference_url https://access.redhat.com/errata/RHSA-2020:2238
reference_id RHSA-2020:2238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2238
179
reference_url https://access.redhat.com/errata/RHSA-2020:2239
reference_id RHSA-2020:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2239
180
reference_url https://access.redhat.com/errata/RHSA-2020:2241
reference_id RHSA-2020:2241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2241
181
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2757
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrfc-9msj-hqbc
75
url VCID-ws4h-edpn-nudd
vulnerability_id VCID-ws4h-edpn-nudd
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21299
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26898
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26933
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2672
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26789
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26841
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26796
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26739
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21299
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041472
reference_id 2041472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041472
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:4918
reference_id RHSA-2022:4918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4918
38
reference_url https://access.redhat.com/errata/RHSA-2022:4919
reference_id RHSA-2022:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4919
39
reference_url https://access.redhat.com/errata/RHSA-2022:4922
reference_id RHSA-2022:4922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4922
40
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
41
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21299
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ws4h-edpn-nudd
76
url VCID-wyfq-yjf2-c7dy
vulnerability_id VCID-wyfq-yjf2-c7dy
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2388
reference_id
reference_type
scores
0
value 0.00805
scoring_system epss
scoring_elements 0.74086
published_at 2026-04-01T12:55:00Z
1
value 0.00805
scoring_system epss
scoring_elements 0.74134
published_at 2026-04-13T12:55:00Z
2
value 0.00805
scoring_system epss
scoring_elements 0.7414
published_at 2026-04-12T12:55:00Z
3
value 0.00805
scoring_system epss
scoring_elements 0.74158
published_at 2026-04-11T12:55:00Z
4
value 0.00805
scoring_system epss
scoring_elements 0.74118
published_at 2026-04-04T12:55:00Z
5
value 0.00805
scoring_system epss
scoring_elements 0.74091
published_at 2026-04-02T12:55:00Z
6
value 0.00805
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-09T12:55:00Z
7
value 0.00805
scoring_system epss
scoring_elements 0.74089
published_at 2026-04-07T12:55:00Z
8
value 0.00805
scoring_system epss
scoring_elements 0.74122
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1983075
reference_id 1983075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1983075
7
reference_url https://security.archlinux.org/ASA-202107-53
reference_id ASA-202107-53
reference_type
scores
url https://security.archlinux.org/ASA-202107-53
8
reference_url https://security.archlinux.org/ASA-202107-54
reference_id ASA-202107-54
reference_type
scores
url https://security.archlinux.org/ASA-202107-54
9
reference_url https://security.archlinux.org/ASA-202107-65
reference_id ASA-202107-65
reference_type
scores
url https://security.archlinux.org/ASA-202107-65
10
reference_url https://security.archlinux.org/ASA-202107-66
reference_id ASA-202107-66
reference_type
scores
url https://security.archlinux.org/ASA-202107-66
11
reference_url https://security.archlinux.org/AVG-2188
reference_id AVG-2188
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2188
12
reference_url https://security.archlinux.org/AVG-2189
reference_id AVG-2189
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2189
13
reference_url https://security.archlinux.org/AVG-2190
reference_id AVG-2190
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2190
14
reference_url https://www.debian.org/security/2021/dsa-4946
reference_id dsa-4946
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://www.debian.org/security/2021/dsa-4946
15
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://security.gentoo.org/glsa/202209-05
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
18
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
19
reference_url https://access.redhat.com/errata/RHSA-2021:2774
reference_id RHSA-2021:2774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2774
20
reference_url https://access.redhat.com/errata/RHSA-2021:2775
reference_id RHSA-2021:2775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2775
21
reference_url https://access.redhat.com/errata/RHSA-2021:2776
reference_id RHSA-2021:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2776
22
reference_url https://access.redhat.com/errata/RHSA-2021:2777
reference_id RHSA-2021:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2777
23
reference_url https://access.redhat.com/errata/RHSA-2021:2778
reference_id RHSA-2021:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2778
24
reference_url https://access.redhat.com/errata/RHSA-2021:2779
reference_id RHSA-2021:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2779
25
reference_url https://access.redhat.com/errata/RHSA-2021:2780
reference_id RHSA-2021:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2780
26
reference_url https://access.redhat.com/errata/RHSA-2021:2781
reference_id RHSA-2021:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2781
27
reference_url https://access.redhat.com/errata/RHSA-2021:2782
reference_id RHSA-2021:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2782
28
reference_url https://access.redhat.com/errata/RHSA-2021:2783
reference_id RHSA-2021:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2783
29
reference_url https://access.redhat.com/errata/RHSA-2021:2784
reference_id RHSA-2021:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2784
30
reference_url https://access.redhat.com/errata/RHSA-2021:2845
reference_id RHSA-2021:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2845
31
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-2388
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyfq-yjf2-c7dy
77
url VCID-wz73-dwgr-3bf7
vulnerability_id VCID-wz73-dwgr-3bf7
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2945.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2945.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2945
reference_id
reference_type
scores
0
value 0.00296
scoring_system epss
scoring_elements 0.52857
published_at 2026-04-09T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.52892
published_at 2026-04-12T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52817
published_at 2026-04-02T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.52908
published_at 2026-04-11T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.52794
published_at 2026-04-01T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52843
published_at 2026-04-04T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.52812
published_at 2026-04-07T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52863
published_at 2026-04-08T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52876
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2945
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1761596
reference_id 1761596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1761596
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2945
reference_id CVE-2019-2945
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2945
68
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
69
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
70
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2019:3134
71
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2019:3135
72
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2019:3136
73
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2019:3157
74
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2019:3158
75
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2019:4109
76
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2019:4110
77
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2019:4113
78
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2019:4115
79
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2020:0006
80
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://access.redhat.com/errata/RHSA-2020:0046
81
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2945
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wz73-dwgr-3bf7
78
url VCID-x3wp-bdkr-7fa8
vulnerability_id VCID-x3wp-bdkr-7fa8
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2975.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2975.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2975
reference_id
reference_type
scores
0
value 0.00488
scoring_system epss
scoring_elements 0.65378
published_at 2026-04-01T12:55:00Z
1
value 0.00488
scoring_system epss
scoring_elements 0.65461
published_at 2026-04-13T12:55:00Z
2
value 0.00488
scoring_system epss
scoring_elements 0.65488
published_at 2026-04-12T12:55:00Z
3
value 0.00488
scoring_system epss
scoring_elements 0.65502
published_at 2026-04-11T12:55:00Z
4
value 0.00488
scoring_system epss
scoring_elements 0.65483
published_at 2026-04-09T12:55:00Z
5
value 0.00488
scoring_system epss
scoring_elements 0.65472
published_at 2026-04-08T12:55:00Z
6
value 0.00488
scoring_system epss
scoring_elements 0.65426
published_at 2026-04-02T12:55:00Z
7
value 0.00488
scoring_system epss
scoring_elements 0.65418
published_at 2026-04-07T12:55:00Z
8
value 0.00488
scoring_system epss
scoring_elements 0.65454
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2975
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760969
reference_id 1760969
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760969
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2975
reference_id CVE-2019-2975
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
1
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2975
71
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
72
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
73
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://access.redhat.com/errata/RHSA-2019:3134
74
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://access.redhat.com/errata/RHSA-2019:3135
75
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://access.redhat.com/errata/RHSA-2019:3136
76
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://access.redhat.com/errata/RHSA-2019:4113
77
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://access.redhat.com/errata/RHSA-2019:4115
78
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://access.redhat.com/errata/RHSA-2020:0006
79
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://access.redhat.com/errata/RHSA-2020:0046
80
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2975
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3wp-bdkr-7fa8
79
url VCID-xfqx-d3jw-yuhn
vulnerability_id VCID-xfqx-d3jw-yuhn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21248
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24337
published_at 2026-04-02T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.2418
published_at 2026-04-13T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.2437
published_at 2026-04-04T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24153
published_at 2026-04-07T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.2422
published_at 2026-04-08T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24263
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.2428
published_at 2026-04-11T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24237
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21248
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041801
reference_id 2041801
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041801
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
reference_id 2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
reference_id 4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
21
reference_url https://www.debian.org/security/2022/dsa-5057
reference_id dsa-5057
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://www.debian.org/security/2022/dsa-5057
22
reference_url https://www.debian.org/security/2022/dsa-5058
reference_id dsa-5058
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://www.debian.org/security/2022/dsa-5058
23
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://security.gentoo.org/glsa/202209-05
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
reference_id KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
25
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
26
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
27
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
28
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
29
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
30
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
31
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
32
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
33
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
34
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
35
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
36
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
37
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
38
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
39
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
40
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
41
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
42
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
43
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
44
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
45
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
46
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
47
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21248
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfqx-d3jw-yuhn
80
url VCID-xrec-qf6z-2ua9
vulnerability_id VCID-xrec-qf6z-2ua9
summary OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2778.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2778.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2778
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62872
published_at 2026-04-13T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62768
published_at 2026-04-01T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62826
published_at 2026-04-02T12:55:00Z
3
value 0.00435
scoring_system epss
scoring_elements 0.62856
published_at 2026-04-04T12:55:00Z
4
value 0.00435
scoring_system epss
scoring_elements 0.6282
published_at 2026-04-07T12:55:00Z
5
value 0.00435
scoring_system epss
scoring_elements 0.62871
published_at 2026-04-08T12:55:00Z
6
value 0.00435
scoring_system epss
scoring_elements 0.62887
published_at 2026-04-09T12:55:00Z
7
value 0.00435
scoring_system epss
scoring_elements 0.62905
published_at 2026-04-11T12:55:00Z
8
value 0.00435
scoring_system epss
scoring_elements 0.62895
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2778
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://security.netapp.com/advisory/ntap-20200416-0004/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/
url https://security.netapp.com/advisory/ntap-20200416-0004/
18
reference_url https://www.debian.org/security/2020/dsa-4662
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/
url https://www.debian.org/security/2020/dsa-4662
19
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823879
reference_id 1823879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823879
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2778
reference_id CVE-2020-2778
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
2
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2778
139
reference_url https://access.redhat.com/errata/RHSA-2020:1509
reference_id RHSA-2020:1509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1509
140
reference_url https://access.redhat.com/errata/RHSA-2020:1514
reference_id RHSA-2020:1514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1514
141
reference_url https://access.redhat.com/errata/RHSA-2020:1517
reference_id RHSA-2020:1517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1517
142
reference_url https://usn.ubuntu.com/4337-1/
reference_id USN-4337-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/
url https://usn.ubuntu.com/4337-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2778
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xrec-qf6z-2ua9
81
url VCID-y5qu-j3wt-wuej
vulnerability_id VCID-y5qu-j3wt-wuej
summary OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21496
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29229
published_at 2026-04-12T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29303
published_at 2026-04-02T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29176
published_at 2026-04-13T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29352
published_at 2026-04-04T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29164
published_at 2026-04-07T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29228
published_at 2026-04-08T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29269
published_at 2026-04-09T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29275
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075849
reference_id 2075849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075849
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21496
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5qu-j3wt-wuej
82
url VCID-y78f-qgn6-rua7
vulnerability_id VCID-y78f-qgn6-rua7
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2964.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2964.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2964
reference_id
reference_type
scores
0
value 0.00476
scoring_system epss
scoring_elements 0.64877
published_at 2026-04-09T12:55:00Z
1
value 0.00476
scoring_system epss
scoring_elements 0.64884
published_at 2026-04-12T12:55:00Z
2
value 0.00476
scoring_system epss
scoring_elements 0.64822
published_at 2026-04-02T12:55:00Z
3
value 0.00476
scoring_system epss
scoring_elements 0.64894
published_at 2026-04-11T12:55:00Z
4
value 0.00476
scoring_system epss
scoring_elements 0.64771
published_at 2026-04-01T12:55:00Z
5
value 0.00476
scoring_system epss
scoring_elements 0.64849
published_at 2026-04-04T12:55:00Z
6
value 0.00476
scoring_system epss
scoring_elements 0.64812
published_at 2026-04-07T12:55:00Z
7
value 0.00476
scoring_system epss
scoring_elements 0.64862
published_at 2026-04-08T12:55:00Z
8
value 0.00476
scoring_system epss
scoring_elements 0.64857
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2964
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
23
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://seclists.org/bugtraq/2019/Oct/27
24
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://seclists.org/bugtraq/2019/Oct/31
25
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
26
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://www.debian.org/security/2019/dsa-4546
27
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://www.debian.org/security/2019/dsa-4548
28
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760963
reference_id 1760963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760963
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2964
reference_id CVE-2019-2964
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2964
67
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
68
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
69
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2019:3134
70
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2019:3135
71
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2019:3136
72
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2019:3157
73
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2019:3158
74
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2019:4109
75
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2019:4110
76
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2019:4113
77
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2019:4115
78
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2020:0006
79
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://access.redhat.com/errata/RHSA-2020:0046
80
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2964
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y78f-qgn6-rua7
83
url VCID-y8wp-rpgd-kfht
vulnerability_id VCID-y8wp-rpgd-kfht
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14578.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14578.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14578
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36656
published_at 2026-04-13T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36617
published_at 2026-04-01T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36773
published_at 2026-04-02T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36804
published_at 2026-04-04T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.3664
published_at 2026-04-07T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36691
published_at 2026-04-08T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36708
published_at 2026-04-09T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36717
published_at 2026-04-11T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36682
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14578
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856991
reference_id 1856991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856991
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
22
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
23
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
24
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
25
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
26
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
27
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
28
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
29
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
30
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
31
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
32
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14578
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8wp-rpgd-kfht
84
url VCID-ycgg-4fpn-b3at
vulnerability_id VCID-ycgg-4fpn-b3at
summary OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2655.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2655
reference_id
reference_type
scores
0
value 0.02147
scoring_system epss
scoring_elements 0.8423
published_at 2026-04-13T12:55:00Z
1
value 0.02147
scoring_system epss
scoring_elements 0.84161
published_at 2026-04-01T12:55:00Z
2
value 0.02147
scoring_system epss
scoring_elements 0.84174
published_at 2026-04-02T12:55:00Z
3
value 0.02147
scoring_system epss
scoring_elements 0.84192
published_at 2026-04-04T12:55:00Z
4
value 0.02147
scoring_system epss
scoring_elements 0.84193
published_at 2026-04-07T12:55:00Z
5
value 0.02147
scoring_system epss
scoring_elements 0.84215
published_at 2026-04-08T12:55:00Z
6
value 0.02147
scoring_system epss
scoring_elements 0.84221
published_at 2026-04-09T12:55:00Z
7
value 0.02147
scoring_system epss
scoring_elements 0.84239
published_at 2026-04-11T12:55:00Z
8
value 0.02147
scoring_system epss
scoring_elements 0.84233
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790951
reference_id 1790951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790951
10
reference_url https://seclists.org/bugtraq/2020/Jan/24
reference_id 24
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/
url https://seclists.org/bugtraq/2020/Jan/24
11
reference_url https://www.debian.org/security/2020/dsa-4605
reference_id dsa-4605
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/
url https://www.debian.org/security/2020/dsa-4605
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
13
reference_url https://access.redhat.com/errata/RHSA-2020:0122
reference_id RHSA-2020:0122
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/
url https://access.redhat.com/errata/RHSA-2020:0122
14
reference_url https://access.redhat.com/errata/RHSA-2020:0128
reference_id RHSA-2020:0128
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/
url https://access.redhat.com/errata/RHSA-2020:0128
15
reference_url https://access.redhat.com/errata/RHSA-2020:0232
reference_id RHSA-2020:0232
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/
url https://access.redhat.com/errata/RHSA-2020:0232
16
reference_url https://usn.ubuntu.com/4257-1/
reference_id USN-4257-1
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/
url https://usn.ubuntu.com/4257-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2655
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycgg-4fpn-b3at
85
url VCID-yqsu-y2mw-pqgt
vulnerability_id VCID-yqsu-y2mw-pqgt
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14593.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14593
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.61238
published_at 2026-04-09T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61223
published_at 2026-04-08T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61175
published_at 2026-04-07T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61209
published_at 2026-04-04T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.61103
published_at 2026-04-01T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.61181
published_at 2026-04-02T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.61226
published_at 2026-04-13T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.61245
published_at 2026-04-12T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61258
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14593
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856784
reference_id 1856784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856784
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
22
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
25
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
27
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
28
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
29
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
30
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
31
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
32
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
33
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
34
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
35
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
36
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
37
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
38
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
39
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
40
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://usn.ubuntu.com/4433-1/
41
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-14593
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqsu-y2mw-pqgt
86
url VCID-yvf2-2a33-zqat
vulnerability_id VCID-yvf2-2a33-zqat
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2989.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2989.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2989
reference_id
reference_type
scores
0
value 0.02323
scoring_system epss
scoring_elements 0.84795
published_at 2026-04-09T12:55:00Z
1
value 0.02323
scoring_system epss
scoring_elements 0.84804
published_at 2026-04-13T12:55:00Z
2
value 0.02323
scoring_system epss
scoring_elements 0.84809
published_at 2026-04-12T12:55:00Z
3
value 0.02323
scoring_system epss
scoring_elements 0.84745
published_at 2026-04-02T12:55:00Z
4
value 0.02323
scoring_system epss
scoring_elements 0.84813
published_at 2026-04-11T12:55:00Z
5
value 0.02323
scoring_system epss
scoring_elements 0.8473
published_at 2026-04-01T12:55:00Z
6
value 0.02323
scoring_system epss
scoring_elements 0.84764
published_at 2026-04-04T12:55:00Z
7
value 0.02323
scoring_system epss
scoring_elements 0.84766
published_at 2026-04-07T12:55:00Z
8
value 0.02323
scoring_system epss
scoring_elements 0.84789
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2989
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10315
23
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
24
reference_url https://seclists.org/bugtraq/2019/Oct/27
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://seclists.org/bugtraq/2019/Oct/27
25
reference_url https://seclists.org/bugtraq/2019/Oct/31
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://seclists.org/bugtraq/2019/Oct/31
26
reference_url https://security.netapp.com/advisory/ntap-20191017-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://security.netapp.com/advisory/ntap-20191017-0001/
27
reference_url https://www.debian.org/security/2019/dsa-4546
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://www.debian.org/security/2019/dsa-4546
28
reference_url https://www.debian.org/security/2019/dsa-4548
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://www.debian.org/security/2019/dsa-4548
29
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1761601
reference_id 1761601
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1761601
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2989
reference_id CVE-2019-2989
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2989
51
reference_url https://access.redhat.com/errata/RHSA-2019:3127
reference_id RHSA-2019:3127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3127
52
reference_url https://access.redhat.com/errata/RHSA-2019:3128
reference_id RHSA-2019:3128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3128
53
reference_url https://access.redhat.com/errata/RHSA-2019:3134
reference_id RHSA-2019:3134
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2019:3134
54
reference_url https://access.redhat.com/errata/RHSA-2019:3135
reference_id RHSA-2019:3135
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2019:3135
55
reference_url https://access.redhat.com/errata/RHSA-2019:3136
reference_id RHSA-2019:3136
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2019:3136
56
reference_url https://access.redhat.com/errata/RHSA-2019:3157
reference_id RHSA-2019:3157
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2019:3157
57
reference_url https://access.redhat.com/errata/RHSA-2019:3158
reference_id RHSA-2019:3158
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2019:3158
58
reference_url https://access.redhat.com/errata/RHSA-2019:4109
reference_id RHSA-2019:4109
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2019:4109
59
reference_url https://access.redhat.com/errata/RHSA-2019:4110
reference_id RHSA-2019:4110
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2019:4110
60
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2019:4113
61
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2019:4115
62
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2020:0006
63
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://access.redhat.com/errata/RHSA-2020:0046
64
reference_url https://usn.ubuntu.com/4223-1/
reference_id USN-4223-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/
url https://usn.ubuntu.com/4223-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2019-2989
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvf2-2a33-zqat
87
url VCID-yxk8-59zb-y7g2
vulnerability_id VCID-yxk8-59zb-y7g2
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35578
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34514
published_at 2026-04-01T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-12T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-02T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34648
published_at 2026-04-13T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34758
published_at 2026-04-04T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34635
published_at 2026-04-07T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-08T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34707
published_at 2026-04-09T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35578
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015653
reference_id 2015653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015653
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
41
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
42
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2021-35578
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxk8-59zb-y7g2
88
url VCID-zh9v-47ue-p7ep
vulnerability_id VCID-zh9v-47ue-p7ep
summary OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21434
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29036
published_at 2026-04-08T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.2911
published_at 2026-04-02T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.2899
published_at 2026-04-13T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.2904
published_at 2026-04-12T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29084
published_at 2026-04-11T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29078
published_at 2026-04-09T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29161
published_at 2026-04-04T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.28972
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075836
reference_id 2075836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075836
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21434
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zh9v-47ue-p7ep
89
url VCID-zr4f-wpm3-f3an
vulnerability_id VCID-zr4f-wpm3-f3an
summary
Multiple vulnerabilities have been found in OpenJDK, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2583.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2583.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2583
reference_id
reference_type
scores
0
value 0.00519
scoring_system epss
scoring_elements 0.66755
published_at 2026-04-02T12:55:00Z
1
value 0.00519
scoring_system epss
scoring_elements 0.66791
published_at 2026-04-13T12:55:00Z
2
value 0.00519
scoring_system epss
scoring_elements 0.66824
published_at 2026-04-12T12:55:00Z
3
value 0.00519
scoring_system epss
scoring_elements 0.66837
published_at 2026-04-11T12:55:00Z
4
value 0.00519
scoring_system epss
scoring_elements 0.66816
published_at 2026-04-09T12:55:00Z
5
value 0.00519
scoring_system epss
scoring_elements 0.66802
published_at 2026-04-08T12:55:00Z
6
value 0.00519
scoring_system epss
scoring_elements 0.66752
published_at 2026-04-07T12:55:00Z
7
value 0.00519
scoring_system epss
scoring_elements 0.66781
published_at 2026-04-04T12:55:00Z
8
value 0.00519
scoring_system epss
scoring_elements 0.66715
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2583
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790444
reference_id 1790444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790444
11
reference_url https://seclists.org/bugtraq/2020/Feb/22
reference_id 22
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://seclists.org/bugtraq/2020/Feb/22
12
reference_url https://seclists.org/bugtraq/2020/Jan/24
reference_id 24
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://seclists.org/bugtraq/2020/Jan/24
13
reference_url https://www.debian.org/security/2020/dsa-4605
reference_id dsa-4605
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://www.debian.org/security/2020/dsa-4605
14
reference_url https://www.debian.org/security/2020/dsa-4621
reference_id dsa-4621
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://www.debian.org/security/2020/dsa-4621
15
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://security.gentoo.org/glsa/202101-19
16
reference_url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
18
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
reference_id msg00060.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
19
reference_url https://access.redhat.com/errata/RHSA-2020:0122
reference_id RHSA-2020:0122
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0122
20
reference_url https://access.redhat.com/errata/RHSA-2020:0128
reference_id RHSA-2020:0128
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0128
21
reference_url https://access.redhat.com/errata/RHSA-2020:0157
reference_id RHSA-2020:0157
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0157
22
reference_url https://access.redhat.com/errata/RHSA-2020:0196
reference_id RHSA-2020:0196
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0196
23
reference_url https://access.redhat.com/errata/RHSA-2020:0202
reference_id RHSA-2020:0202
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0202
24
reference_url https://access.redhat.com/errata/RHSA-2020:0231
reference_id RHSA-2020:0231
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0231
25
reference_url https://access.redhat.com/errata/RHSA-2020:0232
reference_id RHSA-2020:0232
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0232
26
reference_url https://access.redhat.com/errata/RHSA-2020:0465
reference_id RHSA-2020:0465
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0465
27
reference_url https://access.redhat.com/errata/RHSA-2020:0467
reference_id RHSA-2020:0467
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0467
28
reference_url https://access.redhat.com/errata/RHSA-2020:0468
reference_id RHSA-2020:0468
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0468
29
reference_url https://access.redhat.com/errata/RHSA-2020:0469
reference_id RHSA-2020:0469
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0469
30
reference_url https://access.redhat.com/errata/RHSA-2020:0470
reference_id RHSA-2020:0470
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0470
31
reference_url https://access.redhat.com/errata/RHSA-2020:0541
reference_id RHSA-2020:0541
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0541
32
reference_url https://access.redhat.com/errata/RHSA-2020:0632
reference_id RHSA-2020:0632
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://access.redhat.com/errata/RHSA-2020:0632
33
reference_url https://access.redhat.com/errata/RHSA-2020:0856
reference_id RHSA-2020:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0856
34
reference_url https://usn.ubuntu.com/4257-1/
reference_id USN-4257-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/
url https://usn.ubuntu.com/4257-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2020-2583
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr4f-wpm3-f3an
90
url VCID-ztx2-xh6v-nke1
vulnerability_id VCID-ztx2-xh6v-nke1
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21277
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.3747
published_at 2026-04-04T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37445
published_at 2026-04-02T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75391
published_at 2026-04-09T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-11T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-12T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75378
published_at 2026-04-13T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-07T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041479
reference_id 2041479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041479
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
purl pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-11vj-5zz4-6fe7
1
vulnerability VCID-13t7-vubq-8kae
2
vulnerability VCID-2tju-1r8k-sbf9
3
vulnerability VCID-3tav-ffar-hfhb
4
vulnerability VCID-47ae-xdqr-6qgb
5
vulnerability VCID-4snj-etwf-eqe8
6
vulnerability VCID-5et1-ytak-xqh7
7
vulnerability VCID-6196-gvhx-ruh8
8
vulnerability VCID-76rb-sg3r-bqce
9
vulnerability VCID-8cup-qnc8-wudx
10
vulnerability VCID-8wud-7t2q-xfa3
11
vulnerability VCID-9n5v-4daz-eyc2
12
vulnerability VCID-9urr-3gt2-mfhe
13
vulnerability VCID-9uzg-sja9-hkcy
14
vulnerability VCID-a282-ksr4-j3cu
15
vulnerability VCID-a3xk-3wya-s3gm
16
vulnerability VCID-a59u-h67v-yygm
17
vulnerability VCID-apsn-z1br-3bdy
18
vulnerability VCID-b32x-4pu4-jkh4
19
vulnerability VCID-duy9-6f1p-vqah
20
vulnerability VCID-dwh6-xw5k-mqg8
21
vulnerability VCID-dyg2-udwy-cud7
22
vulnerability VCID-e6dm-6767-9kdk
23
vulnerability VCID-fau4-ajny-nfbd
24
vulnerability VCID-fhj9-p1gx-c7hp
25
vulnerability VCID-fwk5-wqvn-4qaz
26
vulnerability VCID-fwv1-sj5y-xygd
27
vulnerability VCID-gjgy-dfq7-zfb2
28
vulnerability VCID-h2w2-8e43-j3g6
29
vulnerability VCID-h7n1-qfs3-v3fw
30
vulnerability VCID-htat-fksw-c3gk
31
vulnerability VCID-jm9f-9y4b-qye7
32
vulnerability VCID-jw6x-cntu-nfht
33
vulnerability VCID-jztz-7cuw-t7ep
34
vulnerability VCID-kq78-adbv-67a7
35
vulnerability VCID-mt9c-tby1-wqe9
36
vulnerability VCID-n71d-tx76-vbbd
37
vulnerability VCID-nr6u-aysf-7kgk
38
vulnerability VCID-ntga-y6cv-a3df
39
vulnerability VCID-nxx8-nehy-qyhg
40
vulnerability VCID-p9na-7jta-9yg4
41
vulnerability VCID-q5gr-6u92-6ybk
42
vulnerability VCID-q9r9-wkqu-6bhu
43
vulnerability VCID-rfs8-njaq-qkc8
44
vulnerability VCID-rggy-f3va-mfay
45
vulnerability VCID-t4r8-ujpb-5kdk
46
vulnerability VCID-t5sp-ea5b-f7af
47
vulnerability VCID-u81s-cs95-4yhx
48
vulnerability VCID-um54-6ggz-gqf9
49
vulnerability VCID-vbw8-4j9f-eya5
50
vulnerability VCID-vpnc-yu7r-bqb6
51
vulnerability VCID-wn4r-ugaa-5ydb
52
vulnerability VCID-x4ms-sbj7-aufu
53
vulnerability VCID-xk2v-7cgk-13ex
54
vulnerability VCID-y8bc-k5qu-c7f5
55
vulnerability VCID-z356-tw9t-q7bp
56
vulnerability VCID-zdra-bzqn-4ug9
57
vulnerability VCID-zgpr-3zft-zqgt
58
vulnerability VCID-zkz6-9t74-5bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1
aliases CVE-2022-21277
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztx2-xh6v-nke1
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1