Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
Typeapk
Namespacealpine
Nameopenjdk8
Version8.422.05-r0
Qualifiers
arch riscv64
distroversion v3.21
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.432.06-r0
Latest_non_vulnerable_version8.452.09-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2tju-1r8k-sbf9
vulnerability_id VCID-2tju-1r8k-sbf9
summary OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61756
published_at 2026-04-13T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.617
published_at 2026-04-02T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-04T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61701
published_at 2026-04-07T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.6175
published_at 2026-04-08T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61766
published_at 2026-04-09T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61787
published_at 2026-04-11T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61775
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
reference_id 2275005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
25
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
26
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
27
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
28
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
29
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
30
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
31
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
32
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
33
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
34
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
35
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
36
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
37
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
38
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
39
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
40
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
41
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
42
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
43
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21094
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tju-1r8k-sbf9
1
url VCID-5et1-ytak-xqh7
vulnerability_id VCID-5et1-ytak-xqh7
summary OpenJDK: Excessive symbol length can lead to infinite loop (8319859)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.5617
published_at 2026-04-13T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56165
published_at 2026-04-04T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56195
published_at 2026-04-08T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56201
published_at 2026-04-09T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.5621
published_at 2026-04-11T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56186
published_at 2026-04-12T12:55:00Z
6
value 0.00333
scoring_system epss
scoring_elements 0.56144
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
reference_id 2297962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21138
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5et1-ytak-xqh7
2
url VCID-76rb-sg3r-bqce
vulnerability_id VCID-76rb-sg3r-bqce
summary OpenJDK: potential UTF8 size overflow (8314794)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63286
published_at 2026-04-13T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63252
published_at 2026-04-07T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63303
published_at 2026-04-08T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63321
published_at 2026-04-09T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63338
published_at 2026-04-11T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-12T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63258
published_at 2026-04-02T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63287
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
reference_id 2297961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21131
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76rb-sg3r-bqce
3
url VCID-9urr-3gt2-mfhe
vulnerability_id VCID-9urr-3gt2-mfhe
summary OpenJDK: long Exception message leading to crash (8319851)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.567
published_at 2026-04-13T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.5668
published_at 2026-04-07T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56701
published_at 2026-04-04T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56732
published_at 2026-04-08T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-09T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56745
published_at 2026-04-11T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.56721
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
reference_id 2274977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
25
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
26
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
27
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
28
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
29
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
30
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
31
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
32
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
33
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
34
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
35
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
36
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
37
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
38
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
39
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
40
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
41
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21011
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9urr-3gt2-mfhe
4
url VCID-htat-fksw-c3gk
vulnerability_id VCID-htat-fksw-c3gk
summary OpenJDK: Pack200 excessive memory allocation (8322114)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21085.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21085
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29114
published_at 2026-04-13T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29238
published_at 2026-04-02T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29288
published_at 2026-04-04T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29103
published_at 2026-04-07T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29166
published_at 2026-04-12T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29207
published_at 2026-04-09T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29213
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275001
reference_id 2275001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275001
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
15
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:35:49Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
16
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:35:49Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
17
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:35:49Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
19
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
20
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
21
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
22
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
23
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
24
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
25
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
26
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
27
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
28
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21085
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htat-fksw-c3gk
5
url VCID-n71d-tx76-vbbd
vulnerability_id VCID-n71d-tx76-vbbd
summary OpenJDK: Out-of-bounds access in 2D image handling (8324559)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.6363
published_at 2026-04-13T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63636
published_at 2026-04-04T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63595
published_at 2026-04-07T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63647
published_at 2026-04-08T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63663
published_at 2026-04-12T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63678
published_at 2026-04-11T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
reference_id 2297976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21145
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n71d-tx76-vbbd
6
url VCID-q9r9-wkqu-6bhu
vulnerability_id VCID-q9r9-wkqu-6bhu
summary OpenJDK: Pack200 increase loading time due to improper header validation (8322106)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21144.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21144
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14775
published_at 2026-04-13T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14764
published_at 2026-04-07T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14855
published_at 2026-04-08T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14909
published_at 2026-04-09T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.1487
published_at 2026-04-11T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14833
published_at 2026-04-12T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14886
published_at 2026-04-02T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14962
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21144
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297964
reference_id 2297964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297964
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:20:24Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0007/
reference_id ntap-20240719-0007
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:20:24Z/
url https://security.netapp.com/advisory/ntap-20240719-0007/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
21
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
22
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
23
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21144
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q9r9-wkqu-6bhu
7
url VCID-rggy-f3va-mfay
vulnerability_id VCID-rggy-f3va-mfay
summary OpenJDK: RangeCheckElimination array index overflow (8323231)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
reference_id
reference_type
scores
0
value 0.00721
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-13T12:55:00Z
1
value 0.00721
scoring_system epss
scoring_elements 0.72434
published_at 2026-04-07T12:55:00Z
2
value 0.00721
scoring_system epss
scoring_elements 0.72472
published_at 2026-04-08T12:55:00Z
3
value 0.00721
scoring_system epss
scoring_elements 0.72485
published_at 2026-04-09T12:55:00Z
4
value 0.00721
scoring_system epss
scoring_elements 0.72508
published_at 2026-04-11T12:55:00Z
5
value 0.00721
scoring_system epss
scoring_elements 0.7249
published_at 2026-04-12T12:55:00Z
6
value 0.00721
scoring_system epss
scoring_elements 0.7244
published_at 2026-04-02T12:55:00Z
7
value 0.00721
scoring_system epss
scoring_elements 0.72458
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
reference_id 2297977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21147
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rggy-f3va-mfay
8
url VCID-zdra-bzqn-4ug9
vulnerability_id VCID-zdra-bzqn-4ug9
summary OpenJDK: integer overflow in C1 compiler address generation (8322122)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-13T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67576
published_at 2026-04-02T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67597
published_at 2026-04-04T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67575
published_at 2026-04-07T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67627
published_at 2026-04-08T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.6764
published_at 2026-04-09T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67663
published_at 2026-04-11T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67648
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
reference_id 2275003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
19
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
21
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
22
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
23
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
24
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
25
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
26
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
27
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
28
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
29
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
30
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
31
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
32
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
33
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
34
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
35
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
36
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
37
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
38
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
39
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
40
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21068
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdra-bzqn-4ug9
9
url VCID-zgpr-3zft-zqgt
vulnerability_id VCID-zgpr-3zft-zqgt
summary OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-13T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-07T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68525
published_at 2026-04-08T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68543
published_at 2026-04-09T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68569
published_at 2026-04-11T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.68556
published_at 2026-04-12T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.68479
published_at 2026-04-02T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68498
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
reference_id 2297963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/openjdk8@8.422.05-r0?arch=riscv64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community
aliases CVE-2024-21140
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgpr-3zft-zqgt
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.422.05-r0%3Farch=riscv64&distroversion=v3.21&reponame=community