Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
Typeapk
Namespacealpine
Nameopenjdk21
Version21.0.3_p9-r0
Qualifiers
arch x86
distroversion v3.20
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version21.0.4_p7-r0
Latest_non_vulnerable_version21.0.8_p9-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2tju-1r8k-sbf9
vulnerability_id VCID-2tju-1r8k-sbf9
summary OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61756
published_at 2026-04-13T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.617
published_at 2026-04-02T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-04T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61701
published_at 2026-04-07T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.6175
published_at 2026-04-08T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61766
published_at 2026-04-09T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61787
published_at 2026-04-11T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61775
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
reference_id 2275005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
25
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
26
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
27
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
28
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
29
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
30
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
31
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
32
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
33
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
34
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
35
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
36
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
37
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
38
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
39
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
40
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
41
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
42
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
43
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk21@21.0.3_p9-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2024-21094
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tju-1r8k-sbf9
1
url VCID-9urr-3gt2-mfhe
vulnerability_id VCID-9urr-3gt2-mfhe
summary OpenJDK: long Exception message leading to crash (8319851)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.567
published_at 2026-04-13T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.5668
published_at 2026-04-07T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56701
published_at 2026-04-04T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56732
published_at 2026-04-08T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-09T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56745
published_at 2026-04-11T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.56721
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
reference_id 2274977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
25
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
26
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
27
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
28
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
29
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
30
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
31
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
32
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
33
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
34
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
35
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
36
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
37
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
38
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
39
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
40
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
41
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk21@21.0.3_p9-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2024-21011
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9urr-3gt2-mfhe
2
url VCID-g126-qfxd-6fcu
vulnerability_id VCID-g126-qfxd-6fcu
summary graalvm: Unauthorized Read Access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20954.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20954
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57455
published_at 2026-04-13T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57497
published_at 2026-04-11T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57474
published_at 2026-04-12T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57426
published_at 2026-04-02T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.57449
published_at 2026-04-04T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57425
published_at 2026-04-07T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-08T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57481
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20954
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2278636
reference_id 2278636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2278636
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
8
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T16:00:30Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
9
reference_url https://access.redhat.com/errata/RHSA-2024:4079
reference_id RHSA-2024:4079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4079
10
reference_url https://access.redhat.com/errata/RHSA-2024:4081
reference_id RHSA-2024:4081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4081
11
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
fixed_packages
0
url pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk21@21.0.3_p9-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2024-20954
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g126-qfxd-6fcu
3
url VCID-h7n1-qfs3-v3fw
vulnerability_id VCID-h7n1-qfs3-v3fw
summary OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3498
published_at 2026-04-13T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35055
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-04T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.34962
published_at 2026-04-07T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35007
published_at 2026-04-08T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35036
published_at 2026-04-09T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-11T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35004
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
reference_id 2274975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
19
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
20
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
21
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
22
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
23
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
24
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
25
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
26
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
27
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
28
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
29
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
30
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
31
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
32
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
33
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
fixed_packages
0
url pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk21@21.0.3_p9-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2024-21012
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7n1-qfs3-v3fw
4
url VCID-mqcy-2run-93d6
vulnerability_id VCID-mqcy-2run-93d6
summary Multiple vulnerabilities have been discovered in Node.js, the worst of which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21892.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21892.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21892
reference_id
reference_type
scores
0
value 0.00448
scoring_system epss
scoring_elements 0.63613
published_at 2026-04-11T12:55:00Z
1
value 0.00448
scoring_system epss
scoring_elements 0.63536
published_at 2026-04-02T12:55:00Z
2
value 0.00448
scoring_system epss
scoring_elements 0.63564
published_at 2026-04-13T12:55:00Z
3
value 0.00448
scoring_system epss
scoring_elements 0.63529
published_at 2026-04-07T12:55:00Z
4
value 0.00448
scoring_system epss
scoring_elements 0.63581
published_at 2026-04-08T12:55:00Z
5
value 0.00448
scoring_system epss
scoring_elements 0.63598
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21892
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064055
reference_id 1064055
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064055
4
reference_url https://hackerone.com/reports/2237545
reference_id 2237545
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-12T04:00:40Z/
url https://hackerone.com/reports/2237545
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2264582
reference_id 2264582
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2264582
6
reference_url https://security.gentoo.org/glsa/202505-11
reference_id GLSA-202505-11
reference_type
scores
url https://security.gentoo.org/glsa/202505-11
7
reference_url https://security.netapp.com/advisory/ntap-20240322-0003/
reference_id ntap-20240322-0003
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-12T04:00:40Z/
url https://security.netapp.com/advisory/ntap-20240322-0003/
8
reference_url https://access.redhat.com/errata/RHSA-2024:1503
reference_id RHSA-2024:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1503
9
reference_url https://access.redhat.com/errata/RHSA-2024:1510
reference_id RHSA-2024:1510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1510
10
reference_url https://access.redhat.com/errata/RHSA-2024:1687
reference_id RHSA-2024:1687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1687
11
reference_url https://access.redhat.com/errata/RHSA-2024:1688
reference_id RHSA-2024:1688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1688
12
reference_url https://access.redhat.com/errata/RHSA-2024:1880
reference_id RHSA-2024:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1880
13
reference_url https://access.redhat.com/errata/RHSA-2024:1932
reference_id RHSA-2024:1932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1932
fixed_packages
0
url pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk21@21.0.3_p9-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2024-21892
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqcy-2run-93d6
5
url VCID-sw4w-57ya-u3fa
vulnerability_id VCID-sw4w-57ya-u3fa
summary graalvm: unauthorized ability to cause a partial denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21098.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21098
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30335
published_at 2026-04-13T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30428
published_at 2026-04-11T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30383
published_at 2026-04-12T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30474
published_at 2026-04-02T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.3052
published_at 2026-04-04T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30331
published_at 2026-04-07T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30391
published_at 2026-04-08T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30425
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21098
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2278674
reference_id 2278674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2278674
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
8
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-15T19:21:01Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
9
reference_url https://access.redhat.com/errata/RHSA-2024:4079
reference_id RHSA-2024:4079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4079
10
reference_url https://access.redhat.com/errata/RHSA-2024:4081
reference_id RHSA-2024:4081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4081
11
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
fixed_packages
0
url pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk21@21.0.3_p9-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2024-21098
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sw4w-57ya-u3fa
6
url VCID-zdra-bzqn-4ug9
vulnerability_id VCID-zdra-bzqn-4ug9
summary OpenJDK: integer overflow in C1 compiler address generation (8322122)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-13T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67576
published_at 2026-04-02T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67597
published_at 2026-04-04T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67575
published_at 2026-04-07T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67627
published_at 2026-04-08T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.6764
published_at 2026-04-09T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67663
published_at 2026-04-11T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67648
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
reference_id 2275003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
19
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
21
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
22
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
23
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
24
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
25
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
26
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
27
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
28
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
29
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
30
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
31
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
32
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
33
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
34
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
35
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
36
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
37
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
38
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
39
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
40
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/openjdk21@21.0.3_p9-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk21@21.0.3_p9-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2024-21068
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdra-bzqn-4ug9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk21@21.0.3_p9-r0%3Farch=x86&distroversion=v3.20&reponame=community