Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/java-21-openjdk-portable-main@21.0.11.0.10-2?arch=hum1
Typerpm
Namespaceredhat
Namejava-21-openjdk-portable-main
Version21.0.11.0.10-2
Qualifiers
arch hum1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1gha-995s-7qdg
vulnerability_id VCID-1gha-995s-7qdg
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22016.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22016.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22016
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09722
published_at 2026-04-24T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09688
published_at 2026-04-26T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30087
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22016
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22016
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460039
reference_id 2460039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460039
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:11:15Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:11403
reference_id RHSA-2026:11403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11403
8
reference_url https://access.redhat.com/errata/RHSA-2026:11655
reference_id RHSA-2026:11655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11655
9
reference_url https://access.redhat.com/errata/RHSA-2026:11822
reference_id RHSA-2026:11822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11822
10
reference_url https://access.redhat.com/errata/RHSA-2026:11829
reference_id RHSA-2026:11829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11829
11
reference_url https://access.redhat.com/errata/RHSA-2026:11902
reference_id RHSA-2026:11902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11902
12
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
13
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
14
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
15
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
16
reference_url https://access.redhat.com/errata/RHSA-2026:9683
reference_id RHSA-2026:9683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9683
17
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
18
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
19
reference_url https://access.redhat.com/errata/RHSA-2026:9686
reference_id RHSA-2026:9686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9686
20
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
21
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
22
reference_url https://access.redhat.com/errata/RHSA-2026:9689
reference_id RHSA-2026:9689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9689
23
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
24
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
25
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
26
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
aliases CVE-2026-22016
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1gha-995s-7qdg
1
url VCID-57sd-8y93-qqhu
vulnerability_id VCID-57sd-8y93-qqhu
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34282.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34282.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34282
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.121
published_at 2026-04-24T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12067
published_at 2026-04-26T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14332
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34282
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34282
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460044
reference_id 2460044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460044
5
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T15:33:23Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
6
reference_url https://access.redhat.com/errata/RHSA-2026:11403
reference_id RHSA-2026:11403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11403
7
reference_url https://access.redhat.com/errata/RHSA-2026:11655
reference_id RHSA-2026:11655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11655
8
reference_url https://access.redhat.com/errata/RHSA-2026:11822
reference_id RHSA-2026:11822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11822
9
reference_url https://access.redhat.com/errata/RHSA-2026:11829
reference_id RHSA-2026:11829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11829
10
reference_url https://access.redhat.com/errata/RHSA-2026:11902
reference_id RHSA-2026:11902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11902
11
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
12
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
13
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
14
reference_url https://access.redhat.com/errata/RHSA-2026:9686
reference_id RHSA-2026:9686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9686
15
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
16
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
17
reference_url https://access.redhat.com/errata/RHSA-2026:9689
reference_id RHSA-2026:9689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9689
18
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
19
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
20
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
21
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
aliases CVE-2026-34282
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57sd-8y93-qqhu
2
url VCID-6r1k-8y1c-q7fm
vulnerability_id VCID-6r1k-8y1c-q7fm
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22007.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22007
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01704
published_at 2026-04-24T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01698
published_at 2026-04-26T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05765
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22007
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460038
reference_id 2460038
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460038
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:05:16Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:11403
reference_id RHSA-2026:11403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11403
8
reference_url https://access.redhat.com/errata/RHSA-2026:11655
reference_id RHSA-2026:11655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11655
9
reference_url https://access.redhat.com/errata/RHSA-2026:11822
reference_id RHSA-2026:11822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11822
10
reference_url https://access.redhat.com/errata/RHSA-2026:11829
reference_id RHSA-2026:11829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11829
11
reference_url https://access.redhat.com/errata/RHSA-2026:11902
reference_id RHSA-2026:11902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11902
12
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
13
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
14
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
15
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
16
reference_url https://access.redhat.com/errata/RHSA-2026:9683
reference_id RHSA-2026:9683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9683
17
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
18
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
19
reference_url https://access.redhat.com/errata/RHSA-2026:9686
reference_id RHSA-2026:9686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9686
20
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
21
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
22
reference_url https://access.redhat.com/errata/RHSA-2026:9689
reference_id RHSA-2026:9689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9689
23
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
24
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
25
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
26
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
aliases CVE-2026-22007
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6r1k-8y1c-q7fm
3
url VCID-jxgd-j4wr-tyb7
vulnerability_id VCID-jxgd-j4wr-tyb7
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34268.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34268.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34268
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01704
published_at 2026-04-24T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01698
published_at 2026-04-26T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05765
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34268
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34268
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460043
reference_id 2460043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460043
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T13:55:07Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:11403
reference_id RHSA-2026:11403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11403
8
reference_url https://access.redhat.com/errata/RHSA-2026:11655
reference_id RHSA-2026:11655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11655
9
reference_url https://access.redhat.com/errata/RHSA-2026:11822
reference_id RHSA-2026:11822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11822
10
reference_url https://access.redhat.com/errata/RHSA-2026:11829
reference_id RHSA-2026:11829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11829
11
reference_url https://access.redhat.com/errata/RHSA-2026:11902
reference_id RHSA-2026:11902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11902
12
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
13
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
14
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
15
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
16
reference_url https://access.redhat.com/errata/RHSA-2026:9683
reference_id RHSA-2026:9683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9683
17
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
18
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
19
reference_url https://access.redhat.com/errata/RHSA-2026:9686
reference_id RHSA-2026:9686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9686
20
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
21
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
22
reference_url https://access.redhat.com/errata/RHSA-2026:9689
reference_id RHSA-2026:9689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9689
23
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
24
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
25
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
26
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
aliases CVE-2026-34268
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxgd-j4wr-tyb7
4
url VCID-sz6r-65q1-q3bh
vulnerability_id VCID-sz6r-65q1-q3bh
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22021.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22021
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11666
published_at 2026-04-24T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11627
published_at 2026-04-26T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14332
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22021
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22021
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460042
reference_id 2460042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460042
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T13:58:16Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:11403
reference_id RHSA-2026:11403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11403
8
reference_url https://access.redhat.com/errata/RHSA-2026:11655
reference_id RHSA-2026:11655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11655
9
reference_url https://access.redhat.com/errata/RHSA-2026:11822
reference_id RHSA-2026:11822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11822
10
reference_url https://access.redhat.com/errata/RHSA-2026:11829
reference_id RHSA-2026:11829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11829
11
reference_url https://access.redhat.com/errata/RHSA-2026:11902
reference_id RHSA-2026:11902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11902
12
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
13
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
14
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
15
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
16
reference_url https://access.redhat.com/errata/RHSA-2026:9683
reference_id RHSA-2026:9683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9683
17
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
18
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
19
reference_url https://access.redhat.com/errata/RHSA-2026:9686
reference_id RHSA-2026:9686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9686
20
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
21
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
22
reference_url https://access.redhat.com/errata/RHSA-2026:9689
reference_id RHSA-2026:9689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9689
23
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
24
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
25
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
26
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
aliases CVE-2026-22021
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sz6r-65q1-q3bh
5
url VCID-xte1-h9nn-4bbk
vulnerability_id VCID-xte1-h9nn-4bbk
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22018.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22018.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22018
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11666
published_at 2026-04-24T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11627
published_at 2026-04-26T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14332
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22018
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22018
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460041
reference_id 2460041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460041
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:05:52Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:11403
reference_id RHSA-2026:11403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11403
8
reference_url https://access.redhat.com/errata/RHSA-2026:11655
reference_id RHSA-2026:11655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11655
9
reference_url https://access.redhat.com/errata/RHSA-2026:11822
reference_id RHSA-2026:11822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11822
10
reference_url https://access.redhat.com/errata/RHSA-2026:11829
reference_id RHSA-2026:11829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11829
11
reference_url https://access.redhat.com/errata/RHSA-2026:11902
reference_id RHSA-2026:11902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11902
12
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
13
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
14
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
15
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
16
reference_url https://access.redhat.com/errata/RHSA-2026:9683
reference_id RHSA-2026:9683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9683
17
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
18
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
19
reference_url https://access.redhat.com/errata/RHSA-2026:9686
reference_id RHSA-2026:9686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9686
20
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
21
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
22
reference_url https://access.redhat.com/errata/RHSA-2026:9689
reference_id RHSA-2026:9689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9689
23
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
24
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
25
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
26
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
aliases CVE-2026-22018
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xte1-h9nn-4bbk
6
url VCID-zsun-4q6p-8fek
vulnerability_id VCID-zsun-4q6p-8fek
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22013.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22013.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22013
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12118
published_at 2026-04-24T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12084
published_at 2026-04-26T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16002
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22013
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22013
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460040
reference_id 2460040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460040
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:09:34Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:11403
reference_id RHSA-2026:11403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11403
8
reference_url https://access.redhat.com/errata/RHSA-2026:11655
reference_id RHSA-2026:11655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11655
9
reference_url https://access.redhat.com/errata/RHSA-2026:11822
reference_id RHSA-2026:11822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11822
10
reference_url https://access.redhat.com/errata/RHSA-2026:11829
reference_id RHSA-2026:11829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11829
11
reference_url https://access.redhat.com/errata/RHSA-2026:11902
reference_id RHSA-2026:11902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11902
12
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
13
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
14
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
15
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
16
reference_url https://access.redhat.com/errata/RHSA-2026:9683
reference_id RHSA-2026:9683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9683
17
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
18
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
19
reference_url https://access.redhat.com/errata/RHSA-2026:9686
reference_id RHSA-2026:9686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9686
20
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
21
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
22
reference_url https://access.redhat.com/errata/RHSA-2026:9689
reference_id RHSA-2026:9689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9689
23
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
24
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
25
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
26
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
aliases CVE-2026-22013
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsun-4q6p-8fek
Fixing_vulnerabilities
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-21-openjdk-portable-main@21.0.11.0.10-2%3Farch=hum1