Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-java/openjdk@8.322_p06
Typeebuild
Namespacedev-java
Nameopenjdk
Version8.322_p06
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.372_p07
Latest_non_vulnerable_version17.0.12_p7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1pdg-7bbt-kqfz
vulnerability_id VCID-1pdg-7bbt-kqfz
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2341
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59239
published_at 2026-04-01T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59349
published_at 2026-04-13T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59313
published_at 2026-04-02T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59337
published_at 2026-04-04T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59301
published_at 2026-04-07T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59352
published_at 2026-04-08T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59365
published_at 2026-04-09T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59384
published_at 2026-04-11T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59367
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1982874
reference_id 1982874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1982874
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
reference_id A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
8
reference_url https://security.archlinux.org/ASA-202107-53
reference_id ASA-202107-53
reference_type
scores
url https://security.archlinux.org/ASA-202107-53
9
reference_url https://security.archlinux.org/ASA-202107-54
reference_id ASA-202107-54
reference_type
scores
url https://security.archlinux.org/ASA-202107-54
10
reference_url https://security.archlinux.org/ASA-202107-65
reference_id ASA-202107-65
reference_type
scores
url https://security.archlinux.org/ASA-202107-65
11
reference_url https://security.archlinux.org/ASA-202107-66
reference_id ASA-202107-66
reference_type
scores
url https://security.archlinux.org/ASA-202107-66
12
reference_url https://security.archlinux.org/AVG-2188
reference_id AVG-2188
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2188
13
reference_url https://security.archlinux.org/AVG-2189
reference_id AVG-2189
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2189
14
reference_url https://security.archlinux.org/AVG-2190
reference_id AVG-2190
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2190
15
reference_url https://www.debian.org/security/2021/dsa-4946
reference_id dsa-4946
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://www.debian.org/security/2021/dsa-4946
16
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://security.gentoo.org/glsa/202209-05
17
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
18
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
reference_id N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
20
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
reference_id PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
22
reference_url https://access.redhat.com/errata/RHSA-2021:2774
reference_id RHSA-2021:2774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2774
23
reference_url https://access.redhat.com/errata/RHSA-2021:2775
reference_id RHSA-2021:2775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2775
24
reference_url https://access.redhat.com/errata/RHSA-2021:2776
reference_id RHSA-2021:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2776
25
reference_url https://access.redhat.com/errata/RHSA-2021:2777
reference_id RHSA-2021:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2777
26
reference_url https://access.redhat.com/errata/RHSA-2021:2778
reference_id RHSA-2021:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2778
27
reference_url https://access.redhat.com/errata/RHSA-2021:2779
reference_id RHSA-2021:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2779
28
reference_url https://access.redhat.com/errata/RHSA-2021:2780
reference_id RHSA-2021:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2780
29
reference_url https://access.redhat.com/errata/RHSA-2021:2781
reference_id RHSA-2021:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2781
30
reference_url https://access.redhat.com/errata/RHSA-2021:2782
reference_id RHSA-2021:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2782
31
reference_url https://access.redhat.com/errata/RHSA-2021:2783
reference_id RHSA-2021:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2783
32
reference_url https://access.redhat.com/errata/RHSA-2021:2784
reference_id RHSA-2021:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2784
33
reference_url https://access.redhat.com/errata/RHSA-2021:2845
reference_id RHSA-2021:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2845
34
reference_url https://access.redhat.com/errata/RHSA-2021:3292
reference_id RHSA-2021:3292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3292
35
reference_url https://access.redhat.com/errata/RHSA-2021:3293
reference_id RHSA-2021:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3293
36
reference_url https://access.redhat.com/errata/RHSA-2021:4089
reference_id RHSA-2021:4089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4089
37
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
reference_id VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-2341
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pdg-7bbt-kqfz
1
url VCID-3aae-859j-1bg9
vulnerability_id VCID-3aae-859j-1bg9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21293
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26644
published_at 2026-04-02T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26688
published_at 2026-04-04T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26473
published_at 2026-04-07T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26541
published_at 2026-04-08T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.2659
published_at 2026-04-09T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26596
published_at 2026-04-11T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26551
published_at 2026-04-12T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26494
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041417
reference_id 2041417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041417
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21293
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3aae-859j-1bg9
2
url VCID-3b1m-995s-r7a8
vulnerability_id VCID-3b1m-995s-r7a8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2369
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56676
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56788
published_at 2026-04-13T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56771
published_at 2026-04-02T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56791
published_at 2026-04-04T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56768
published_at 2026-04-07T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.5682
published_at 2026-04-08T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56824
published_at 2026-04-09T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56832
published_at 2026-04-11T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56809
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2369
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1982879
reference_id 1982879
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1982879
7
reference_url https://security.archlinux.org/ASA-202107-53
reference_id ASA-202107-53
reference_type
scores
url https://security.archlinux.org/ASA-202107-53
8
reference_url https://security.archlinux.org/ASA-202107-54
reference_id ASA-202107-54
reference_type
scores
url https://security.archlinux.org/ASA-202107-54
9
reference_url https://security.archlinux.org/ASA-202107-65
reference_id ASA-202107-65
reference_type
scores
url https://security.archlinux.org/ASA-202107-65
10
reference_url https://security.archlinux.org/ASA-202107-66
reference_id ASA-202107-66
reference_type
scores
url https://security.archlinux.org/ASA-202107-66
11
reference_url https://security.archlinux.org/AVG-2188
reference_id AVG-2188
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2188
12
reference_url https://security.archlinux.org/AVG-2189
reference_id AVG-2189
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2189
13
reference_url https://security.archlinux.org/AVG-2190
reference_id AVG-2190
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2190
14
reference_url https://www.debian.org/security/2021/dsa-4946
reference_id dsa-4946
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://www.debian.org/security/2021/dsa-4946
15
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://security.gentoo.org/glsa/202209-05
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
18
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
19
reference_url https://access.redhat.com/errata/RHSA-2021:2774
reference_id RHSA-2021:2774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2774
20
reference_url https://access.redhat.com/errata/RHSA-2021:2775
reference_id RHSA-2021:2775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2775
21
reference_url https://access.redhat.com/errata/RHSA-2021:2776
reference_id RHSA-2021:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2776
22
reference_url https://access.redhat.com/errata/RHSA-2021:2777
reference_id RHSA-2021:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2777
23
reference_url https://access.redhat.com/errata/RHSA-2021:2778
reference_id RHSA-2021:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2778
24
reference_url https://access.redhat.com/errata/RHSA-2021:2779
reference_id RHSA-2021:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2779
25
reference_url https://access.redhat.com/errata/RHSA-2021:2780
reference_id RHSA-2021:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2780
26
reference_url https://access.redhat.com/errata/RHSA-2021:2781
reference_id RHSA-2021:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2781
27
reference_url https://access.redhat.com/errata/RHSA-2021:2782
reference_id RHSA-2021:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2782
28
reference_url https://access.redhat.com/errata/RHSA-2021:2783
reference_id RHSA-2021:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2783
29
reference_url https://access.redhat.com/errata/RHSA-2021:2784
reference_id RHSA-2021:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2784
30
reference_url https://access.redhat.com/errata/RHSA-2021:2845
reference_id RHSA-2021:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2845
31
reference_url https://access.redhat.com/errata/RHSA-2021:3292
reference_id RHSA-2021:3292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3292
32
reference_url https://access.redhat.com/errata/RHSA-2021:3293
reference_id RHSA-2021:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3293
33
reference_url https://access.redhat.com/errata/RHSA-2021:4089
reference_id RHSA-2021:4089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4089
34
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-2369
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3b1m-995s-r7a8
3
url VCID-3hj5-z3ck-tkha
vulnerability_id VCID-3hj5-z3ck-tkha
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21365
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041785
reference_id 2041785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041785
19
reference_url https://www.debian.org/security/2022/dsa-5057
reference_id dsa-5057
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://www.debian.org/security/2022/dsa-5057
20
reference_url https://www.debian.org/security/2022/dsa-5058
reference_id dsa-5058
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://www.debian.org/security/2022/dsa-5058
21
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://security.gentoo.org/glsa/202209-05
22
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
23
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
25
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
26
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
27
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
28
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
29
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
30
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
31
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
32
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
33
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
34
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
35
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
36
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
37
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
38
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
39
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
40
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
41
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
42
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
43
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
44
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21365
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hj5-z3ck-tkha
4
url VCID-4thy-7844-xuc9
vulnerability_id VCID-4thy-7844-xuc9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21360
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041491
reference_id 2041491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041491
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21360
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4thy-7844-xuc9
5
url VCID-5xg6-kds9-g3hf
vulnerability_id VCID-5xg6-kds9-g3hf
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21294
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21294
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041427
reference_id 2041427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041427
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21294
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xg6-kds9-g3hf
6
url VCID-61c5-8468-33c8
vulnerability_id VCID-61c5-8468-33c8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35565
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35925
published_at 2026-04-01T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.35997
published_at 2026-04-13T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36023
published_at 2026-04-12T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36146
published_at 2026-04-04T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36061
published_at 2026-04-11T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36055
published_at 2026-04-09T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36031
published_at 2026-04-08T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.35982
published_at 2026-04-07T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36116
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014508
reference_id 2014508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014508
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
19
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://www.debian.org/security/2021/dsa-5000
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
38
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
39
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35565
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-61c5-8468-33c8
7
url VCID-6wtu-f43b-1ue9
vulnerability_id VCID-6wtu-f43b-1ue9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35559
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30596
published_at 2026-04-07T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30602
published_at 2026-04-13T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30647
published_at 2026-04-12T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30692
published_at 2026-04-11T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30654
published_at 2026-04-08T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30781
published_at 2026-04-04T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30732
published_at 2026-04-02T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30687
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014518
reference_id 2014518
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014518
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
43
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
44
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35559
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wtu-f43b-1ue9
8
url VCID-6zn4-b8k4-3bcn
vulnerability_id VCID-6zn4-b8k4-3bcn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35586
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37711
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37796
published_at 2026-04-07T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-02T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37812
published_at 2026-04-13T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37837
published_at 2026-04-12T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37874
published_at 2026-04-11T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37859
published_at 2026-04-09T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-08T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015308
reference_id 2015308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015308
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
41
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
42
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
43
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35586
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6zn4-b8k4-3bcn
9
url VCID-7jyy-8x35-wbba
vulnerability_id VCID-7jyy-8x35-wbba
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2432
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.4612
published_at 2026-04-01T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.4616
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46187
published_at 2026-04-13T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.4618
published_at 2026-04-04T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46128
published_at 2026-04-07T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46185
published_at 2026-04-08T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46183
published_at 2026-04-09T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46206
published_at 2026-04-11T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46178
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2432
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1994980
reference_id 1994980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1994980
4
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/
url https://security.gentoo.org/glsa/202209-05
5
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
6
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3293
reference_id RHSA-2021:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3293
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-2432
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyy-8x35-wbba
10
url VCID-97bv-kegv-uyd9
vulnerability_id VCID-97bv-kegv-uyd9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35567
reference_id
reference_type
scores
0
value 0.0022
scoring_system epss
scoring_elements 0.44539
published_at 2026-04-01T12:55:00Z
1
value 0.0022
scoring_system epss
scoring_elements 0.44618
published_at 2026-04-13T12:55:00Z
2
value 0.0022
scoring_system epss
scoring_elements 0.44617
published_at 2026-04-12T12:55:00Z
3
value 0.0022
scoring_system epss
scoring_elements 0.44638
published_at 2026-04-04T12:55:00Z
4
value 0.0022
scoring_system epss
scoring_elements 0.44576
published_at 2026-04-07T12:55:00Z
5
value 0.0022
scoring_system epss
scoring_elements 0.44628
published_at 2026-04-08T12:55:00Z
6
value 0.0022
scoring_system epss
scoring_elements 0.4463
published_at 2026-04-09T12:55:00Z
7
value 0.0022
scoring_system epss
scoring_elements 0.44647
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015658
reference_id 2015658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015658
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35567
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97bv-kegv-uyd9
11
url VCID-98bc-5jrc-5kas
vulnerability_id VCID-98bc-5jrc-5kas
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21341
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041897
reference_id 2041897
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041897
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21341
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-98bc-5jrc-5kas
12
url VCID-arwd-bvw4-gya1
vulnerability_id VCID-arwd-bvw4-gya1
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21271
reference_id
reference_type
scores
0
value 0.00589
scoring_system epss
scoring_elements 0.69101
published_at 2026-04-07T12:55:00Z
1
value 0.00589
scoring_system epss
scoring_elements 0.69148
published_at 2026-04-13T12:55:00Z
2
value 0.00589
scoring_system epss
scoring_elements 0.69192
published_at 2026-04-11T12:55:00Z
3
value 0.00589
scoring_system epss
scoring_elements 0.69171
published_at 2026-04-09T12:55:00Z
4
value 0.00589
scoring_system epss
scoring_elements 0.6912
published_at 2026-04-04T12:55:00Z
5
value 0.00589
scoring_system epss
scoring_elements 0.69151
published_at 2026-04-08T12:55:00Z
6
value 0.00589
scoring_system epss
scoring_elements 0.69098
published_at 2026-04-02T12:55:00Z
7
value 0.00589
scoring_system epss
scoring_elements 0.69177
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21271
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/
url https://security.gentoo.org/glsa/202209-05
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21271
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-arwd-bvw4-gya1
13
url VCID-bqav-d2f9-x7d1
vulnerability_id VCID-bqav-d2f9-x7d1
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2161
reference_id
reference_type
scores
0
value 0.01404
scoring_system epss
scoring_elements 0.80398
published_at 2026-04-01T12:55:00Z
1
value 0.01404
scoring_system epss
scoring_elements 0.80452
published_at 2026-04-13T12:55:00Z
2
value 0.01404
scoring_system epss
scoring_elements 0.80404
published_at 2026-04-02T12:55:00Z
3
value 0.01404
scoring_system epss
scoring_elements 0.80425
published_at 2026-04-04T12:55:00Z
4
value 0.01404
scoring_system epss
scoring_elements 0.80414
published_at 2026-04-07T12:55:00Z
5
value 0.01404
scoring_system epss
scoring_elements 0.80444
published_at 2026-04-08T12:55:00Z
6
value 0.01404
scoring_system epss
scoring_elements 0.80454
published_at 2026-04-09T12:55:00Z
7
value 0.01404
scoring_system epss
scoring_elements 0.80473
published_at 2026-04-11T12:55:00Z
8
value 0.01404
scoring_system epss
scoring_elements 0.80458
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2161
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951231
reference_id 1951231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951231
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
reference_id 5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
5
reference_url https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures
reference_id april-2021.html#fixed-common-vulnerabilities-and-exposures
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures
6
reference_url https://security.archlinux.org/AVG-1865
reference_id AVG-1865
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1865
7
reference_url https://security.archlinux.org/AVG-1866
reference_id AVG-1866
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1866
8
reference_url https://security.archlinux.org/AVG-1867
reference_id AVG-1867
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1867
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
reference_id CFXOKM2233JVGYDOWW77BN54X3GZTIBK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
reference_id CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
11
reference_url https://www.debian.org/security/2021/dsa-4899
reference_id dsa-4899
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://www.debian.org/security/2021/dsa-4899
12
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://security.gentoo.org/glsa/202209-05
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
reference_id MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
14
reference_url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
reference_id MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
16
reference_url https://security.netapp.com/advisory/ntap-20210513-0001/
reference_id ntap-20210513-0001
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://security.netapp.com/advisory/ntap-20210513-0001/
17
reference_url https://access.redhat.com/errata/RHSA-2021:1445
reference_id RHSA-2021:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1445
18
reference_url https://access.redhat.com/errata/RHSA-2021:1447
reference_id RHSA-2021:1447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1447
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
reference_id UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-2161
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bqav-d2f9-x7d1
14
url VCID-cfyt-zw34-xbaz
vulnerability_id VCID-cfyt-zw34-xbaz
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21349.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21349.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21349
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.3028
published_at 2026-04-07T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.3034
published_at 2026-04-08T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30471
published_at 2026-04-04T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30425
published_at 2026-04-02T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30286
published_at 2026-04-13T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30333
published_at 2026-04-12T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30377
published_at 2026-04-11T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30374
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21349
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2046273
reference_id 2046273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2046273
4
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:33Z/
url https://security.gentoo.org/glsa/202209-05
5
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:33Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
6
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:33Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21349
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cfyt-zw34-xbaz
15
url VCID-g2fj-4mgh-23fs
vulnerability_id VCID-g2fj-4mgh-23fs
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21283
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30894
published_at 2026-04-04T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30847
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32867
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32868
published_at 2026-04-11T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32829
published_at 2026-04-12T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32803
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.3279
published_at 2026-04-07T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32838
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041400
reference_id 2041400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041400
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21283
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2fj-4mgh-23fs
16
url VCID-gksn-mb6g-rue5
vulnerability_id VCID-gksn-mb6g-rue5
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35556
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33383
published_at 2026-04-01T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.3341
published_at 2026-04-13T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33437
published_at 2026-04-08T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33471
published_at 2026-04-09T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33474
published_at 2026-04-11T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33433
published_at 2026-04-12T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33519
published_at 2026-04-02T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33552
published_at 2026-04-04T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33392
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014515
reference_id 2014515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014515
14
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
15
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
16
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
17
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
18
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
19
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
20
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
21
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
22
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
23
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
24
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
25
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
26
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
27
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
28
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
29
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
30
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
31
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
32
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
33
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
34
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
35
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
36
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
37
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35556
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gksn-mb6g-rue5
17
url VCID-hdz7-kcy9-juah
vulnerability_id VCID-hdz7-kcy9-juah
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35564
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28817
published_at 2026-04-01T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28773
published_at 2026-04-13T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-11T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28862
published_at 2026-04-09T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28755
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28948
published_at 2026-04-04T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28898
published_at 2026-04-02T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28822
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35564
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015061
reference_id 2015061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015061
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
43
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
44
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35564
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz7-kcy9-juah
18
url VCID-he8f-erpk-sqh8
vulnerability_id VCID-he8f-erpk-sqh8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38981
published_at 2026-04-01T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39155
published_at 2026-04-12T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39136
published_at 2026-04-13T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39189
published_at 2026-04-04T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-07T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39163
published_at 2026-04-08T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.3918
published_at 2026-04-09T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39192
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
reference_id 2014524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
43
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
44
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35561
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-he8f-erpk-sqh8
19
url VCID-mumk-x95v-bfc8
vulnerability_id VCID-mumk-x95v-bfc8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21366
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.3747
published_at 2026-04-04T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37445
published_at 2026-04-02T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75391
published_at 2026-04-09T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-11T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-12T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75378
published_at 2026-04-13T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-07T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041789
reference_id 2041789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041789
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21366
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mumk-x95v-bfc8
20
url VCID-ne6z-gg9f-qkcy
vulnerability_id VCID-ne6z-gg9f-qkcy
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21282
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.33007
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.33041
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32871
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32918
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3295
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32912
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32887
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21282
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041435
reference_id 2041435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041435
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21282
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ne6z-gg9f-qkcy
21
url VCID-p5ye-19wy-ayb8
vulnerability_id VCID-p5ye-19wy-ayb8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31435
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31432
published_at 2026-04-07T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.3157
published_at 2026-04-02T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.3144
published_at 2026-04-13T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-12T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-11T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31514
published_at 2026-04-09T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31485
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31613
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
reference_id 2015311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
41
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
42
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
43
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35603
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ye-19wy-ayb8
22
url VCID-rgbz-akft-f7e6
vulnerability_id VCID-rgbz-akft-f7e6
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21296
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.33007
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.33041
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32871
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32918
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3295
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32912
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32887
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21296
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041439
reference_id 2041439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041439
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21296
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-akft-f7e6
23
url VCID-rmqx-pseh-q7a7
vulnerability_id VCID-rmqx-pseh-q7a7
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35550
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23084
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23142
published_at 2026-04-13T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23201
published_at 2026-04-12T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23303
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23092
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23259
published_at 2026-04-02T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23238
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23217
published_at 2026-04-09T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23166
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35550
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015648
reference_id 2015648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015648
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
19
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://www.debian.org/security/2021/dsa-5000
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35550
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmqx-pseh-q7a7
24
url VCID-shg1-t3nh-67hk
vulnerability_id VCID-shg1-t3nh-67hk
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21305
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45854
published_at 2026-04-02T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45875
published_at 2026-04-04T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45825
published_at 2026-04-07T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45881
published_at 2026-04-08T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45878
published_at 2026-04-09T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.459
published_at 2026-04-11T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.4587
published_at 2026-04-12T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45877
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21305
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041878
reference_id 2041878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041878
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21305
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shg1-t3nh-67hk
25
url VCID-tna8-m3b1-nkhn
vulnerability_id VCID-tna8-m3b1-nkhn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21291
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.32057
published_at 2026-04-04T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.32017
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32861
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-11T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32824
published_at 2026-04-12T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32799
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32785
published_at 2026-04-07T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32832
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21291
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041831
reference_id 2041831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041831
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21291
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tna8-m3b1-nkhn
26
url VCID-tr4r-wm4s-auej
vulnerability_id VCID-tr4r-wm4s-auej
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21340
reference_id
reference_type
scores
0
value 0.06446
scoring_system epss
scoring_elements 0.91022
published_at 2026-04-02T12:55:00Z
1
value 0.06446
scoring_system epss
scoring_elements 0.91031
published_at 2026-04-04T12:55:00Z
2
value 0.06446
scoring_system epss
scoring_elements 0.9104
published_at 2026-04-07T12:55:00Z
3
value 0.06446
scoring_system epss
scoring_elements 0.91052
published_at 2026-04-08T12:55:00Z
4
value 0.06446
scoring_system epss
scoring_elements 0.91059
published_at 2026-04-09T12:55:00Z
5
value 0.06446
scoring_system epss
scoring_elements 0.91067
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041884
reference_id 2041884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041884
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21340
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tr4r-wm4s-auej
27
url VCID-u9xe-x4f1-9fc8
vulnerability_id VCID-u9xe-x4f1-9fc8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2163
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26911
published_at 2026-04-01T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26795
published_at 2026-04-13T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2695
published_at 2026-04-02T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26986
published_at 2026-04-04T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26777
published_at 2026-04-07T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26846
published_at 2026-04-08T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26893
published_at 2026-04-09T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26896
published_at 2026-04-11T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26852
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2163
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951217
reference_id 1951217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951217
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
reference_id 5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
6
reference_url https://security.archlinux.org/AVG-1847
reference_id AVG-1847
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1847
7
reference_url https://security.archlinux.org/AVG-1848
reference_id AVG-1848
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1848
8
reference_url https://security.archlinux.org/AVG-1849
reference_id AVG-1849
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1849
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
reference_id CFXOKM2233JVGYDOWW77BN54X3GZTIBK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
reference_id CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
11
reference_url https://www.debian.org/security/2021/dsa-4899
reference_id dsa-4899
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://www.debian.org/security/2021/dsa-4899
12
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://security.gentoo.org/glsa/202209-05
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
reference_id MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
14
reference_url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
reference_id MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
16
reference_url https://security.netapp.com/advisory/ntap-20210513-0001/
reference_id ntap-20210513-0001
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://security.netapp.com/advisory/ntap-20210513-0001/
17
reference_url https://access.redhat.com/errata/RHSA-2021:1297
reference_id RHSA-2021:1297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1297
18
reference_url https://access.redhat.com/errata/RHSA-2021:1298
reference_id RHSA-2021:1298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1298
19
reference_url https://access.redhat.com/errata/RHSA-2021:1299
reference_id RHSA-2021:1299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1299
20
reference_url https://access.redhat.com/errata/RHSA-2021:1301
reference_id RHSA-2021:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1301
21
reference_url https://access.redhat.com/errata/RHSA-2021:1305
reference_id RHSA-2021:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1305
22
reference_url https://access.redhat.com/errata/RHSA-2021:1306
reference_id RHSA-2021:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1306
23
reference_url https://access.redhat.com/errata/RHSA-2021:1307
reference_id RHSA-2021:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1307
24
reference_url https://access.redhat.com/errata/RHSA-2021:1315
reference_id RHSA-2021:1315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1315
25
reference_url https://access.redhat.com/errata/RHSA-2021:1444
reference_id RHSA-2021:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1444
26
reference_url https://access.redhat.com/errata/RHSA-2021:1445
reference_id RHSA-2021:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1445
27
reference_url https://access.redhat.com/errata/RHSA-2021:1446
reference_id RHSA-2021:1446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1446
28
reference_url https://access.redhat.com/errata/RHSA-2021:1447
reference_id RHSA-2021:1447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1447
29
reference_url https://access.redhat.com/errata/RHSA-2022:6735
reference_id RHSA-2022:6735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6735
30
reference_url https://access.redhat.com/errata/RHSA-2022:6755
reference_id RHSA-2022:6755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6755
31
reference_url https://access.redhat.com/errata/RHSA-2022:6756
reference_id RHSA-2022:6756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6756
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
reference_id UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
33
reference_url https://usn.ubuntu.com/4892-1/
reference_id USN-4892-1
reference_type
scores
url https://usn.ubuntu.com/4892-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-2163
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9xe-x4f1-9fc8
28
url VCID-ws4h-edpn-nudd
vulnerability_id VCID-ws4h-edpn-nudd
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21299
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26898
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26933
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2672
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26789
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26841
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26796
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26739
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21299
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041472
reference_id 2041472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041472
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:4918
reference_id RHSA-2022:4918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4918
38
reference_url https://access.redhat.com/errata/RHSA-2022:4919
reference_id RHSA-2022:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4919
39
reference_url https://access.redhat.com/errata/RHSA-2022:4922
reference_id RHSA-2022:4922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4922
40
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
41
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21299
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ws4h-edpn-nudd
29
url VCID-wyfq-yjf2-c7dy
vulnerability_id VCID-wyfq-yjf2-c7dy
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2388
reference_id
reference_type
scores
0
value 0.00805
scoring_system epss
scoring_elements 0.74086
published_at 2026-04-01T12:55:00Z
1
value 0.00805
scoring_system epss
scoring_elements 0.74134
published_at 2026-04-13T12:55:00Z
2
value 0.00805
scoring_system epss
scoring_elements 0.7414
published_at 2026-04-12T12:55:00Z
3
value 0.00805
scoring_system epss
scoring_elements 0.74158
published_at 2026-04-11T12:55:00Z
4
value 0.00805
scoring_system epss
scoring_elements 0.74118
published_at 2026-04-04T12:55:00Z
5
value 0.00805
scoring_system epss
scoring_elements 0.74091
published_at 2026-04-02T12:55:00Z
6
value 0.00805
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-09T12:55:00Z
7
value 0.00805
scoring_system epss
scoring_elements 0.74089
published_at 2026-04-07T12:55:00Z
8
value 0.00805
scoring_system epss
scoring_elements 0.74122
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1983075
reference_id 1983075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1983075
7
reference_url https://security.archlinux.org/ASA-202107-53
reference_id ASA-202107-53
reference_type
scores
url https://security.archlinux.org/ASA-202107-53
8
reference_url https://security.archlinux.org/ASA-202107-54
reference_id ASA-202107-54
reference_type
scores
url https://security.archlinux.org/ASA-202107-54
9
reference_url https://security.archlinux.org/ASA-202107-65
reference_id ASA-202107-65
reference_type
scores
url https://security.archlinux.org/ASA-202107-65
10
reference_url https://security.archlinux.org/ASA-202107-66
reference_id ASA-202107-66
reference_type
scores
url https://security.archlinux.org/ASA-202107-66
11
reference_url https://security.archlinux.org/AVG-2188
reference_id AVG-2188
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2188
12
reference_url https://security.archlinux.org/AVG-2189
reference_id AVG-2189
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2189
13
reference_url https://security.archlinux.org/AVG-2190
reference_id AVG-2190
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2190
14
reference_url https://www.debian.org/security/2021/dsa-4946
reference_id dsa-4946
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://www.debian.org/security/2021/dsa-4946
15
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://security.gentoo.org/glsa/202209-05
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
18
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
19
reference_url https://access.redhat.com/errata/RHSA-2021:2774
reference_id RHSA-2021:2774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2774
20
reference_url https://access.redhat.com/errata/RHSA-2021:2775
reference_id RHSA-2021:2775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2775
21
reference_url https://access.redhat.com/errata/RHSA-2021:2776
reference_id RHSA-2021:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2776
22
reference_url https://access.redhat.com/errata/RHSA-2021:2777
reference_id RHSA-2021:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2777
23
reference_url https://access.redhat.com/errata/RHSA-2021:2778
reference_id RHSA-2021:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2778
24
reference_url https://access.redhat.com/errata/RHSA-2021:2779
reference_id RHSA-2021:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2779
25
reference_url https://access.redhat.com/errata/RHSA-2021:2780
reference_id RHSA-2021:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2780
26
reference_url https://access.redhat.com/errata/RHSA-2021:2781
reference_id RHSA-2021:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2781
27
reference_url https://access.redhat.com/errata/RHSA-2021:2782
reference_id RHSA-2021:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2782
28
reference_url https://access.redhat.com/errata/RHSA-2021:2783
reference_id RHSA-2021:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2783
29
reference_url https://access.redhat.com/errata/RHSA-2021:2784
reference_id RHSA-2021:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2784
30
reference_url https://access.redhat.com/errata/RHSA-2021:2845
reference_id RHSA-2021:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2845
31
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-2388
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyfq-yjf2-c7dy
30
url VCID-xfqx-d3jw-yuhn
vulnerability_id VCID-xfqx-d3jw-yuhn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21248
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24337
published_at 2026-04-02T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.2418
published_at 2026-04-13T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.2437
published_at 2026-04-04T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24153
published_at 2026-04-07T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.2422
published_at 2026-04-08T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24263
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.2428
published_at 2026-04-11T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24237
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21248
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041801
reference_id 2041801
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041801
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
reference_id 2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
reference_id 4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
21
reference_url https://www.debian.org/security/2022/dsa-5057
reference_id dsa-5057
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://www.debian.org/security/2022/dsa-5057
22
reference_url https://www.debian.org/security/2022/dsa-5058
reference_id dsa-5058
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://www.debian.org/security/2022/dsa-5058
23
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://security.gentoo.org/glsa/202209-05
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
reference_id KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
25
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
26
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
27
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
28
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
29
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
30
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
31
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
32
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
33
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
34
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
35
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
36
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
37
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
38
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
39
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
40
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
41
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
42
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
43
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
44
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
45
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
46
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
47
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21248
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfqx-d3jw-yuhn
31
url VCID-yxk8-59zb-y7g2
vulnerability_id VCID-yxk8-59zb-y7g2
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35578
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34514
published_at 2026-04-01T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-12T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-02T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34648
published_at 2026-04-13T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34758
published_at 2026-04-04T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34635
published_at 2026-04-07T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-08T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34707
published_at 2026-04-09T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35578
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015653
reference_id 2015653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015653
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
41
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
42
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35578
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxk8-59zb-y7g2
32
url VCID-zb8p-5k26-5fc9
vulnerability_id VCID-zb8p-5k26-5fc9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35588
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37016
published_at 2026-04-01T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37065
published_at 2026-04-13T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37193
published_at 2026-04-02T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37221
published_at 2026-04-04T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37053
published_at 2026-04-07T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37104
published_at 2026-04-08T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37116
published_at 2026-04-09T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37126
published_at 2026-04-11T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37092
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35588
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015659
reference_id 2015659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015659
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
5
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
6
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://security.gentoo.org/glsa/202209-05
7
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
10
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
11
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
12
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
13
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
14
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
15
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
16
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
17
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2021-35588
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb8p-5k26-5fc9
33
url VCID-ztx2-xh6v-nke1
vulnerability_id VCID-ztx2-xh6v-nke1
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21277
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.3747
published_at 2026-04-04T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37445
published_at 2026-04-02T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75391
published_at 2026-04-09T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-11T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-12T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75378
published_at 2026-04-13T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-07T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041479
reference_id 2041479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041479
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:ebuild/dev-java/openjdk@8.322_p06
purl pkg:ebuild/dev-java/openjdk@8.322_p06
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06
1
url pkg:ebuild/dev-java/openjdk@11.0.14_p9
purl pkg:ebuild/dev-java/openjdk@11.0.14_p9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@11.0.14_p9
2
url pkg:ebuild/dev-java/openjdk@17.0.2_p8
purl pkg:ebuild/dev-java/openjdk@17.0.2_p8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@17.0.2_p8
aliases CVE-2022-21277
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztx2-xh6v-nke1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.322_p06