Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
Typeapk
Namespacealpine
Nameopenjdk17
Version17.0.3_p7-r0
Qualifiers
arch x86_64
distroversion v3.22
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version17.0.4_p8-r0
Latest_non_vulnerable_version17.0.18_p8-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1d6t-ndfc-m7hg
vulnerability_id VCID-1d6t-ndfc-m7hg
summary OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21443
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18078
published_at 2026-04-13T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18274
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18326
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18029
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18111
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18168
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18174
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18126
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21443
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075793
reference_id 2075793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075793
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk17@17.0.3_p7-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
aliases CVE-2022-21443
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1d6t-ndfc-m7hg
1
url VCID-a95g-84vs-xbav
vulnerability_id VCID-a95g-84vs-xbav
summary OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21476
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-13T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40224
published_at 2026-04-11T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40186
published_at 2026-04-12T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40824
published_at 2026-04-09T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40815
published_at 2026-04-02T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40842
published_at 2026-04-04T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40767
published_at 2026-04-07T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40817
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010597
reference_id 1010597
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010597
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075842
reference_id 2075842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075842
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
15
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
16
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
17
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
18
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
19
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
20
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
21
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
22
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
23
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
24
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
25
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
26
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
27
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
28
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
29
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
30
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
31
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
32
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
33
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
34
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
35
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
36
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
37
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk17@17.0.3_p7-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
aliases CVE-2022-21476
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a95g-84vs-xbav
2
url VCID-hx4c-96gx-2fbq
vulnerability_id VCID-hx4c-96gx-2fbq
summary OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21426
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19319
published_at 2026-04-08T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19476
published_at 2026-04-02T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19268
published_at 2026-04-13T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19326
published_at 2026-04-12T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19374
published_at 2026-04-11T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19371
published_at 2026-04-09T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19524
published_at 2026-04-04T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.1924
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075788
reference_id 2075788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075788
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
39
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
40
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
41
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
42
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk17@17.0.3_p7-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
aliases CVE-2022-21426
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hx4c-96gx-2fbq
3
url VCID-kngz-x6mk-fqer
vulnerability_id VCID-kngz-x6mk-fqer
summary OpenJDK: Improper ECDSA signature verification (Libraries, 8277233)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21449.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21449.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21449
reference_id
reference_type
scores
0
value 0.34335
scoring_system epss
scoring_elements 0.96986
published_at 2026-04-13T12:55:00Z
1
value 0.34335
scoring_system epss
scoring_elements 0.96984
published_at 2026-04-11T12:55:00Z
2
value 0.34898
scoring_system epss
scoring_elements 0.97006
published_at 2026-04-07T12:55:00Z
3
value 0.34898
scoring_system epss
scoring_elements 0.97017
published_at 2026-04-09T12:55:00Z
4
value 0.34898
scoring_system epss
scoring_elements 0.97016
published_at 2026-04-08T12:55:00Z
5
value 0.34898
scoring_system epss
scoring_elements 0.97005
published_at 2026-04-04T12:55:00Z
6
value 0.34898
scoring_system epss
scoring_elements 0.97001
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21449
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url http://www.openwall.com/lists/oss-security/2022/04/29/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/29/1
10
reference_url http://www.openwall.com/lists/oss-security/2022/04/30/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/30/1
11
reference_url http://www.openwall.com/lists/oss-security/2022/05/01/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/05/01/1
12
reference_url http://www.openwall.com/lists/oss-security/2022/05/02/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/05/02/1
13
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/2
14
reference_url http://www.openwall.com/lists/oss-security/2022/04/30/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/30/2
15
reference_url http://www.openwall.com/lists/oss-security/2022/05/01/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/05/01/2
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075821
reference_id 2075821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075821
17
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/3
reference_id 3
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/3
18
reference_url http://www.openwall.com/lists/oss-security/2022/04/30/3
reference_id 3
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/30/3
19
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/4
reference_id 4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/4
20
reference_url http://www.openwall.com/lists/oss-security/2022/04/30/4
reference_id 4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/30/4
21
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/5
22
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/6
reference_id 6
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/6
23
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/7
reference_id 7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/7
24
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
25
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
26
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url https://www.debian.org/security/2022/dsa-5128
27
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url https://www.debian.org/security/2022/dsa-5131
28
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
29
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
30
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
31
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
32
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
33
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
34
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
fixed_packages
0
url pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk17@17.0.3_p7-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
aliases CVE-2022-21449
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kngz-x6mk-fqer
4
url VCID-y5qu-j3wt-wuej
vulnerability_id VCID-y5qu-j3wt-wuej
summary OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21496
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29229
published_at 2026-04-12T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29303
published_at 2026-04-02T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29176
published_at 2026-04-13T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29352
published_at 2026-04-04T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29164
published_at 2026-04-07T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29228
published_at 2026-04-08T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29269
published_at 2026-04-09T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29275
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075849
reference_id 2075849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075849
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk17@17.0.3_p7-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
aliases CVE-2022-21496
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5qu-j3wt-wuej
5
url VCID-zh9v-47ue-p7ep
vulnerability_id VCID-zh9v-47ue-p7ep
summary OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21434
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29036
published_at 2026-04-08T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.2911
published_at 2026-04-02T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.2899
published_at 2026-04-13T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.2904
published_at 2026-04-12T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29084
published_at 2026-04-11T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29078
published_at 2026-04-09T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29161
published_at 2026-04-04T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.28972
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075836
reference_id 2075836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075836
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/openjdk17@17.0.3_p7-r0?arch=x86_64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk17@17.0.3_p7-r0%3Farch=x86_64&distroversion=v3.22&reponame=community
aliases CVE-2022-21434
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zh9v-47ue-p7ep
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk17@17.0.3_p7-r0%3Farch=x86_64&distroversion=v3.22&reponame=community