Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-java/openjdk@11.0.24_p8
Typeebuild
Namespacedev-java
Nameopenjdk
Version11.0.24_p8
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version17.0.2_p8
Latest_non_vulnerable_version17.0.12_p7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1buj-5nv9-bbcd
vulnerability_id VCID-1buj-5nv9-bbcd
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22044.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22044
reference_id
reference_type
scores
0
value 0.00141
scoring_system epss
scoring_elements 0.34387
published_at 2026-04-02T12:55:00Z
1
value 0.00141
scoring_system epss
scoring_elements 0.34294
published_at 2026-04-13T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34415
published_at 2026-04-04T12:55:00Z
3
value 0.00141
scoring_system epss
scoring_elements 0.34282
published_at 2026-04-07T12:55:00Z
4
value 0.00141
scoring_system epss
scoring_elements 0.34325
published_at 2026-04-08T12:55:00Z
5
value 0.00141
scoring_system epss
scoring_elements 0.34355
published_at 2026-04-09T12:55:00Z
6
value 0.00141
scoring_system epss
scoring_elements 0.34357
published_at 2026-04-11T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34317
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22044
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22044
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221642
reference_id 2221642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221642
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:00Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://www.debian.org/security/2023/dsa-5458
reference_id dsa-5458
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:00Z/
url https://www.debian.org/security/2023/dsa-5458
7
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
8
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
9
reference_url https://security.netapp.com/advisory/ntap-20230725-0006/
reference_id ntap-20230725-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:00Z/
url https://security.netapp.com/advisory/ntap-20230725-0006/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
11
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
12
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
13
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
14
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
15
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
16
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
17
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
18
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2023-22044
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1buj-5nv9-bbcd
1
url VCID-6196-gvhx-ruh8
vulnerability_id VCID-6196-gvhx-ruh8
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38305
published_at 2026-04-07T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38417
published_at 2026-04-02T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38441
published_at 2026-04-04T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38355
published_at 2026-04-08T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38363
published_at 2026-04-09T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.3838
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44159
published_at 2026-04-13T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44158
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
reference_id 2318534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-21235
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6196-gvhx-ruh8
2
url VCID-8cup-qnc8-wudx
vulnerability_id VCID-8cup-qnc8-wudx
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55466
published_at 2026-04-13T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55441
published_at 2026-04-02T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55465
published_at 2026-04-04T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55444
published_at 2026-04-07T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55495
published_at 2026-04-09T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55505
published_at 2026-04-11T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55483
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
reference_id 2257837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-20952
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cup-qnc8-wudx
3
url VCID-9n5v-4daz-eyc2
vulnerability_id VCID-9n5v-4daz-eyc2
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26611
published_at 2026-04-13T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26708
published_at 2026-04-09T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26713
published_at 2026-04-11T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26668
published_at 2026-04-12T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26767
published_at 2026-04-02T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26807
published_at 2026-04-04T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26591
published_at 2026-04-07T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26658
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
reference_id 2318530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-21217
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5v-4daz-eyc2
4
url VCID-a282-ksr4-j3cu
vulnerability_id VCID-a282-ksr4-j3cu
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26809
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26849
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26634
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26702
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26753
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26756
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26712
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26655
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
reference_id 2243627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
6
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
7
reference_url https://access.redhat.com/errata/RHSA-2023:5725
reference_id RHSA-2023:5725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5725
8
reference_url https://access.redhat.com/errata/RHSA-2023:5726
reference_id RHSA-2023:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5726
9
reference_url https://access.redhat.com/errata/RHSA-2023:5727
reference_id RHSA-2023:5727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5727
10
reference_url https://access.redhat.com/errata/RHSA-2023:5728
reference_id RHSA-2023:5728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5728
11
reference_url https://access.redhat.com/errata/RHSA-2023:5729
reference_id RHSA-2023:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5729
12
reference_url https://access.redhat.com/errata/RHSA-2023:5730
reference_id RHSA-2023:5730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5730
13
reference_url https://access.redhat.com/errata/RHSA-2023:5731
reference_id RHSA-2023:5731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5731
14
reference_url https://access.redhat.com/errata/RHSA-2023:5732
reference_id RHSA-2023:5732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5732
15
reference_url https://access.redhat.com/errata/RHSA-2023:5733
reference_id RHSA-2023:5733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5733
16
reference_url https://access.redhat.com/errata/RHSA-2023:5734
reference_id RHSA-2023:5734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5734
17
reference_url https://access.redhat.com/errata/RHSA-2023:5735
reference_id RHSA-2023:5735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5735
18
reference_url https://access.redhat.com/errata/RHSA-2023:5736
reference_id RHSA-2023:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5736
19
reference_url https://access.redhat.com/errata/RHSA-2023:5737
reference_id RHSA-2023:5737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5737
20
reference_url https://access.redhat.com/errata/RHSA-2023:5739
reference_id RHSA-2023:5739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5739
21
reference_url https://access.redhat.com/errata/RHSA-2023:5740
reference_id RHSA-2023:5740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5740
22
reference_url https://access.redhat.com/errata/RHSA-2023:5741
reference_id RHSA-2023:5741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5741
23
reference_url https://access.redhat.com/errata/RHSA-2023:5742
reference_id RHSA-2023:5742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5742
24
reference_url https://access.redhat.com/errata/RHSA-2023:5743
reference_id RHSA-2023:5743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5743
25
reference_url https://access.redhat.com/errata/RHSA-2023:5744
reference_id RHSA-2023:5744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5744
26
reference_url https://access.redhat.com/errata/RHSA-2023:5745
reference_id RHSA-2023:5745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5745
27
reference_url https://access.redhat.com/errata/RHSA-2023:5746
reference_id RHSA-2023:5746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5746
28
reference_url https://access.redhat.com/errata/RHSA-2023:5747
reference_id RHSA-2023:5747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5747
29
reference_url https://access.redhat.com/errata/RHSA-2023:5750
reference_id RHSA-2023:5750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5750
30
reference_url https://access.redhat.com/errata/RHSA-2023:5751
reference_id RHSA-2023:5751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5751
31
reference_url https://access.redhat.com/errata/RHSA-2023:5752
reference_id RHSA-2023:5752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5752
32
reference_url https://access.redhat.com/errata/RHSA-2023:5753
reference_id RHSA-2023:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5753
33
reference_url https://access.redhat.com/errata/RHSA-2023:5761
reference_id RHSA-2023:5761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5761
34
reference_url https://access.redhat.com/errata/RHSA-2023:6738
reference_id RHSA-2023:6738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6738
35
reference_url https://access.redhat.com/errata/RHSA-2023:6887
reference_id RHSA-2023:6887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6887
36
reference_url https://access.redhat.com/errata/RHSA-2024:0866
reference_id RHSA-2024:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0866
37
reference_url https://access.redhat.com/errata/RHSA-2024:0879
reference_id RHSA-2024:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0879
38
reference_url https://usn.ubuntu.com/6527-1/
reference_id USN-6527-1
reference_type
scores
url https://usn.ubuntu.com/6527-1/
39
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2023-22081
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a282-ksr4-j3cu
5
url VCID-a59u-h67v-yygm
vulnerability_id VCID-a59u-h67v-yygm
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22041.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22041.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22041
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22241
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22289
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22073
published_at 2026-04-07T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22154
published_at 2026-04-08T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22208
published_at 2026-04-09T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22229
published_at 2026-04-11T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22188
published_at 2026-04-12T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22128
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22041
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2223207
reference_id 2223207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2223207
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
27
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
28
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
29
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
30
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
31
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
32
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
33
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
34
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
35
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
36
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2023-22041
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a59u-h67v-yygm
6
url VCID-d6gm-thtx-bqb7
vulnerability_id VCID-d6gm-thtx-bqb7
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20932.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20932
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38459
published_at 2026-04-13T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.38447
published_at 2026-04-07T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.38498
published_at 2026-04-08T12:55:00Z
3
value 0.00172
scoring_system epss
scoring_elements 0.38507
published_at 2026-04-09T12:55:00Z
4
value 0.00172
scoring_system epss
scoring_elements 0.38522
published_at 2026-04-11T12:55:00Z
5
value 0.00172
scoring_system epss
scoring_elements 0.38484
published_at 2026-04-12T12:55:00Z
6
value 0.00172
scoring_system epss
scoring_elements 0.3856
published_at 2026-04-02T12:55:00Z
7
value 0.00172
scoring_system epss
scoring_elements 0.38584
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257720
reference_id 2257720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257720
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:51:25Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
13
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
14
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
15
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
16
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
17
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
18
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
19
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-20932
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d6gm-thtx-bqb7
7
url VCID-dyg2-udwy-cud7
vulnerability_id VCID-dyg2-udwy-cud7
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22045
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.3604
published_at 2026-04-13T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36098
published_at 2026-04-09T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36104
published_at 2026-04-11T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36066
published_at 2026-04-12T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.3603
published_at 2026-04-07T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.3608
published_at 2026-04-08T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42145
published_at 2026-04-02T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42172
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221645
reference_id 2221645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221645
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4166
reference_id RHSA-2023:4166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4166
27
reference_url https://access.redhat.com/errata/RHSA-2023:4167
reference_id RHSA-2023:4167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4167
28
reference_url https://access.redhat.com/errata/RHSA-2023:4168
reference_id RHSA-2023:4168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4168
29
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
30
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
31
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
32
reference_url https://access.redhat.com/errata/RHSA-2023:4172
reference_id RHSA-2023:4172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4172
33
reference_url https://access.redhat.com/errata/RHSA-2023:4173
reference_id RHSA-2023:4173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4173
34
reference_url https://access.redhat.com/errata/RHSA-2023:4174
reference_id RHSA-2023:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4174
35
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
36
reference_url https://access.redhat.com/errata/RHSA-2023:4176
reference_id RHSA-2023:4176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4176
37
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
38
reference_url https://access.redhat.com/errata/RHSA-2023:4178
reference_id RHSA-2023:4178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4178
39
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
40
reference_url https://access.redhat.com/errata/RHSA-2023:4209
reference_id RHSA-2023:4209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4209
41
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
42
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
43
reference_url https://access.redhat.com/errata/RHSA-2023:4212
reference_id RHSA-2023:4212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4212
44
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
45
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
46
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2023-22045
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyg2-udwy-cud7
8
url VCID-fau4-ajny-nfbd
vulnerability_id VCID-fau4-ajny-nfbd
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40536
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40563
published_at 2026-04-08T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40574
published_at 2026-04-09T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40556
published_at 2026-04-12T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-02T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40592
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40513
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
reference_id 2257859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-20921
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fau4-ajny-nfbd
9
url VCID-fwk5-wqvn-4qaz
vulnerability_id VCID-fwk5-wqvn-4qaz
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
reference_id
reference_type
scores
0
value 0.00211
scoring_system epss
scoring_elements 0.43651
published_at 2026-04-13T12:55:00Z
1
value 0.00211
scoring_system epss
scoring_elements 0.43665
published_at 2026-04-02T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.4369
published_at 2026-04-04T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.43625
published_at 2026-04-07T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.43676
published_at 2026-04-08T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.4368
published_at 2026-04-09T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.437
published_at 2026-04-11T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43668
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
reference_id 2257850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
29
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
30
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
31
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
32
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
33
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
34
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-20926
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwk5-wqvn-4qaz
10
url VCID-gjgy-dfq7-zfb2
vulnerability_id VCID-gjgy-dfq7-zfb2
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22049
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20289
published_at 2026-04-13T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20363
published_at 2026-04-09T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20392
published_at 2026-04-11T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20347
published_at 2026-04-12T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20223
published_at 2026-04-07T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20303
published_at 2026-04-08T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24864
published_at 2026-04-02T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24903
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22049
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221647
reference_id 2221647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221647
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4166
reference_id RHSA-2023:4166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4166
27
reference_url https://access.redhat.com/errata/RHSA-2023:4167
reference_id RHSA-2023:4167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4167
28
reference_url https://access.redhat.com/errata/RHSA-2023:4168
reference_id RHSA-2023:4168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4168
29
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
30
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
31
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
32
reference_url https://access.redhat.com/errata/RHSA-2023:4172
reference_id RHSA-2023:4172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4172
33
reference_url https://access.redhat.com/errata/RHSA-2023:4173
reference_id RHSA-2023:4173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4173
34
reference_url https://access.redhat.com/errata/RHSA-2023:4174
reference_id RHSA-2023:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4174
35
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
36
reference_url https://access.redhat.com/errata/RHSA-2023:4176
reference_id RHSA-2023:4176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4176
37
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
38
reference_url https://access.redhat.com/errata/RHSA-2023:4178
reference_id RHSA-2023:4178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4178
39
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
40
reference_url https://access.redhat.com/errata/RHSA-2023:4209
reference_id RHSA-2023:4209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4209
41
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
42
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
43
reference_url https://access.redhat.com/errata/RHSA-2023:4212
reference_id RHSA-2023:4212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4212
44
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
45
reference_url https://access.redhat.com/errata/RHSA-2023:4876
reference_id RHSA-2023:4876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4876
46
reference_url https://access.redhat.com/errata/RHSA-2023:4877
reference_id RHSA-2023:4877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4877
47
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
48
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2023-22049
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjgy-dfq7-zfb2
11
url VCID-jw6x-cntu-nfht
vulnerability_id VCID-jw6x-cntu-nfht
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22036.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22036.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22036
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26986
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.27022
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26812
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26881
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26928
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26932
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26888
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26831
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22036
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221634
reference_id 2221634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221634
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
27
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
28
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
29
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
30
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
31
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
32
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
33
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
34
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
35
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
36
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2023-22036
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jw6x-cntu-nfht
12
url VCID-jztz-7cuw-t7ep
vulnerability_id VCID-jztz-7cuw-t7ep
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12193
published_at 2026-04-13T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.1226
published_at 2026-04-09T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12267
published_at 2026-04-11T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12229
published_at 2026-04-12T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12285
published_at 2026-04-02T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12331
published_at 2026-04-04T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.1213
published_at 2026-04-07T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12211
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
reference_id 2257874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-20945
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jztz-7cuw-t7ep
13
url VCID-kh6a-4hzc-27bw
vulnerability_id VCID-kh6a-4hzc-27bw
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22067.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22067.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22067
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38606
published_at 2026-04-13T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.3867
published_at 2026-04-11T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.38632
published_at 2026-04-12T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40652
published_at 2026-04-02T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.4068
published_at 2026-04-04T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.406
published_at 2026-04-07T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40651
published_at 2026-04-08T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.4066
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22067
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243637
reference_id 2243637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243637
4
reference_url https://www.debian.org/security/2023/dsa-5537
reference_id dsa-5537
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-12T15:07:56Z/
url https://www.debian.org/security/2023/dsa-5537
5
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
6
reference_url https://security.netapp.com/advisory/ntap-20231027-0006/
reference_id ntap-20231027-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-12T15:07:56Z/
url https://security.netapp.com/advisory/ntap-20231027-0006/
7
reference_url https://access.redhat.com/errata/RHSA-2023:5725
reference_id RHSA-2023:5725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5725
8
reference_url https://access.redhat.com/errata/RHSA-2023:5726
reference_id RHSA-2023:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5726
9
reference_url https://access.redhat.com/errata/RHSA-2023:5727
reference_id RHSA-2023:5727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5727
10
reference_url https://access.redhat.com/errata/RHSA-2023:5728
reference_id RHSA-2023:5728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5728
11
reference_url https://access.redhat.com/errata/RHSA-2023:5729
reference_id RHSA-2023:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5729
12
reference_url https://access.redhat.com/errata/RHSA-2023:5730
reference_id RHSA-2023:5730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5730
13
reference_url https://access.redhat.com/errata/RHSA-2023:5731
reference_id RHSA-2023:5731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5731
14
reference_url https://access.redhat.com/errata/RHSA-2023:5732
reference_id RHSA-2023:5732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5732
15
reference_url https://access.redhat.com/errata/RHSA-2023:5733
reference_id RHSA-2023:5733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5733
16
reference_url https://access.redhat.com/errata/RHSA-2023:5761
reference_id RHSA-2023:5761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5761
17
reference_url https://access.redhat.com/errata/RHSA-2024:0866
reference_id RHSA-2024:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0866
18
reference_url https://access.redhat.com/errata/RHSA-2024:0879
reference_id RHSA-2024:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0879
19
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2023-22067
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kh6a-4hzc-27bw
14
url VCID-nr6u-aysf-7kgk
vulnerability_id VCID-nr6u-aysf-7kgk
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
reference_id
reference_type
scores
0
value 0.0017
scoring_system epss
scoring_elements 0.38196
published_at 2026-04-13T12:55:00Z
1
value 0.0017
scoring_system epss
scoring_elements 0.38237
published_at 2026-04-09T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.38255
published_at 2026-04-11T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.3822
published_at 2026-04-12T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38286
published_at 2026-04-02T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38309
published_at 2026-04-04T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.38178
published_at 2026-04-07T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.38228
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
reference_id 2257853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
39
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
40
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
41
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-20919
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nr6u-aysf-7kgk
15
url VCID-vpnc-yu7r-bqb6
vulnerability_id VCID-vpnc-yu7r-bqb6
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17036
published_at 2026-04-13T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17169
published_at 2026-04-09T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17144
published_at 2026-04-11T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17096
published_at 2026-04-12T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.1719
published_at 2026-04-02T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17241
published_at 2026-04-04T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17021
published_at 2026-04-07T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17111
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
reference_id 2318526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-21208
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpnc-yu7r-bqb6
16
url VCID-vuhe-re6z-8kax
vulnerability_id VCID-vuhe-re6z-8kax
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22025.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22025
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32344
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32217
published_at 2026-04-13T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32382
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32207
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32256
published_at 2026-04-08T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32285
published_at 2026-04-09T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32286
published_at 2026-04-11T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32248
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243805
reference_id 2243805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243805
6
reference_url https://www.debian.org/security/2023/dsa-5548
reference_id dsa-5548
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:29Z/
url https://www.debian.org/security/2023/dsa-5548
7
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
8
reference_url https://security.netapp.com/advisory/ntap-20231027-0006/
reference_id ntap-20231027-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:29Z/
url https://security.netapp.com/advisory/ntap-20231027-0006/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5745
reference_id RHSA-2023:5745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5745
10
reference_url https://access.redhat.com/errata/RHSA-2023:5746
reference_id RHSA-2023:5746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5746
11
reference_url https://access.redhat.com/errata/RHSA-2023:5747
reference_id RHSA-2023:5747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5747
12
reference_url https://access.redhat.com/errata/RHSA-2023:5750
reference_id RHSA-2023:5750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5750
13
reference_url https://access.redhat.com/errata/RHSA-2023:5751
reference_id RHSA-2023:5751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5751
14
reference_url https://access.redhat.com/errata/RHSA-2023:5752
reference_id RHSA-2023:5752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5752
15
reference_url https://access.redhat.com/errata/RHSA-2023:5753
reference_id RHSA-2023:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5753
16
reference_url https://access.redhat.com/errata/RHSA-2023:6738
reference_id RHSA-2023:6738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6738
17
reference_url https://access.redhat.com/errata/RHSA-2023:6887
reference_id RHSA-2023:6887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6887
18
reference_url https://usn.ubuntu.com/6527-1/
reference_id USN-6527-1
reference_type
scores
url https://usn.ubuntu.com/6527-1/
19
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2023-22025
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vuhe-re6z-8kax
17
url VCID-wn4r-ugaa-5ydb
vulnerability_id VCID-wn4r-ugaa-5ydb
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46944
published_at 2026-04-13T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46923
published_at 2026-04-02T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.4694
published_at 2026-04-04T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46888
published_at 2026-04-07T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46942
published_at 2026-04-08T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46939
published_at 2026-04-09T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46963
published_at 2026-04-11T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46936
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
reference_id 2257728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-20918
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wn4r-ugaa-5ydb
18
url VCID-x4ms-sbj7-aufu
vulnerability_id VCID-x4ms-sbj7-aufu
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22006.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22006
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35272
published_at 2026-04-02T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.353
published_at 2026-04-04T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35182
published_at 2026-04-07T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35226
published_at 2026-04-08T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35251
published_at 2026-04-09T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35255
published_at 2026-04-11T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3522
published_at 2026-04-12T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35196
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221626
reference_id 2221626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221626
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
27
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
28
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
29
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
30
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
31
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
32
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
33
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
34
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
35
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
36
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2023-22006
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4ms-sbj7-aufu
19
url VCID-z356-tw9t-q7bp
vulnerability_id VCID-z356-tw9t-q7bp
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34648
published_at 2026-04-13T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34708
published_at 2026-04-09T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-11T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-12T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-02T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34758
published_at 2026-04-04T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34636
published_at 2026-04-07T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
reference_id 2318524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
12
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
13
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
14
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
15
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
16
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
17
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
18
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
19
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
20
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
21
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
22
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
23
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
24
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
25
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
26
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
27
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
28
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
29
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
30
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
31
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
32
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
33
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
34
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.422_p05
purl pkg:ebuild/dev-java/openjdk@8.422_p05
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.422_p05
1
url pkg:ebuild/dev-java/openjdk@11.0.24_p8
purl pkg:ebuild/dev-java/openjdk@11.0.24_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8
2
url pkg:ebuild/dev-java/openjdk@17.0.12_p7
purl pkg:ebuild/dev-java/openjdk@17.0.12_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.12_p7
aliases CVE-2024-21210
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z356-tw9t-q7bp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.24_p8