{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","type":"ebuild","namespace":"dev-java","name":"openjdk","version":"8.272_p10","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.322_p06","latest_non_vulnerable_version":"17.0.12_p7","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39541?format=json","vulnerability_id":"VCID-1nr6-3bq8-nbfn","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2590.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2590","reference_id":"","reference_type":"","scores":[{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63759","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63596","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.6356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63644","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.6364","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63624","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63642","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63649","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63622","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63717","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63682","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63708","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790556","reference_id":"1790556","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790556"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-2590"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1nr6-3bq8-nbfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39545?format=json","vulnerability_id":"VCID-2ggq-ccut-5ycs","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2601.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2601","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70666","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70614","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70586","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70616","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70543","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70569","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7057","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70523","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72341","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72281","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72307","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72334","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72357","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790570","reference_id":"1790570","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790570"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-2601"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ggq-ccut-5ycs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34416?format=json","vulnerability_id":"VCID-3v2y-qzfu-nydb","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14779","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36908","published_at":"2026-05-14T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41755","published_at":"2026-05-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41842","published_at":"2026-05-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41825","published_at":"2026-05-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41757","published_at":"2026-05-05T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41982","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42131","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41988","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42042","published_at":"2026-04-01T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4178","published_at":"2026-05-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42119","published_at":"2026-04-08T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42116","published_at":"2026-04-18T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42142","published_at":"2026-04-16T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42091","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42115","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889271","reference_id":"1889271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889271"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/","reference_id":"N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/","reference_id":"OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0530","reference_id":"RHSA-2021:0530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0530"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/","reference_id":"XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/","reference_id":"XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/","reference_id":"YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/","reference_id":"Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-14779"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3v2y-qzfu-nydb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34420?format=json","vulnerability_id":"VCID-7913-mqsn-3bd8","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14796.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14796.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14796","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32729","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32743","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32782","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32758","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.3238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32243","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32307","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32317","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32224","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32246","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32777","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32803","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32805","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32522","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889697","reference_id":"1889697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889697"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0530","reference_id":"RHSA-2021:0530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0530"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-14796"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7913-mqsn-3bd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34422?format=json","vulnerability_id":"VCID-d6wf-827v-a7c3","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14798.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14798","reference_id":"","reference_type":"","scores":[{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47564","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47682","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47616","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4757","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47485","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47551","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47572","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47514","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47543","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47924","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891135","reference_id":"1891135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891135"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-14798"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d6wf-827v-a7c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39548?format=json","vulnerability_id":"VCID-ey12-2uq3-6bar","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2654.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2654","reference_id":"","reference_type":"","scores":[{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56752","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56593","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.5671","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.5673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.5674","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56712","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56651","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56668","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.5665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56605","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56652","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56714","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56665","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56688","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791217","reference_id":"1791217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791217"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2236","reference_id":"RHSA-2020:2236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2238","reference_id":"RHSA-2020:2238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-2654"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ey12-2uq3-6bar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34417?format=json","vulnerability_id":"VCID-jc9v-4116-4yas","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14781.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14781","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27425","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27504","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27482","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27421","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27593","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27668","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27779","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27864","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27906","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27925","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27441","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27718","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889274","reference_id":"1889274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889274"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0717","reference_id":"RHSA-2021:0717","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0717"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0736","reference_id":"RHSA-2021:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0736"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-14781"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jc9v-4116-4yas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34419?format=json","vulnerability_id":"VCID-m3j8-8gff-6fg4","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14792.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14792","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40119","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4038","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40489","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40458","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40272","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4026","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4004","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40108","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40125","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40029","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40053","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40477","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40498","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40442","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889280","reference_id":"1889280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889280"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-14792"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m3j8-8gff-6fg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34423?format=json","vulnerability_id":"VCID-mh6k-v939-m7hj","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14803.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14803","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1217","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12333","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12189","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12133","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11995","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12081","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12192","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12247","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12135","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12379","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12311","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12194","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12218","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12439","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889895","reference_id":"1889895","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889895"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0717","reference_id":"RHSA-2021:0717","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0717"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0733","reference_id":"RHSA-2021:0733","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0736","reference_id":"RHSA-2021:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0736"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-14803"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mh6k-v939-m7hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39543?format=json","vulnerability_id":"VCID-mwfy-hus1-37gt","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2593.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2593","reference_id":"","reference_type":"","scores":[{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70728","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70477","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70586","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70595","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70623","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70632","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70631","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70604","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70644","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70676","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70674","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790884","reference_id":"1790884","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790884"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0465","reference_id":"RHSA-2020:0465","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0467","reference_id":"RHSA-2020:0467","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0468","reference_id":"RHSA-2020:0468","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0469","reference_id":"RHSA-2020:0469","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0470","reference_id":"RHSA-2020:0470","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0856","reference_id":"RHSA-2020:0856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0856"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-2593"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwfy-hus1-37gt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39551?format=json","vulnerability_id":"VCID-qv2k-dwe1-4bed","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2659.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2659","reference_id":"","reference_type":"","scores":[{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52686","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.5267","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52655","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52617","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52579","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52521","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52574","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52619","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52583","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52608","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52568","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52522","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52613","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791284","reference_id":"1791284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791284"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0465","reference_id":"RHSA-2020:0465","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0467","reference_id":"RHSA-2020:0467","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0468","reference_id":"RHSA-2020:0468","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0469","reference_id":"RHSA-2020:0469","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0470","reference_id":"RHSA-2020:0470","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0856","reference_id":"RHSA-2020:0856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0856"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:31Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-2659"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qv2k-dwe1-4bed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39546?format=json","vulnerability_id":"VCID-spnj-gvva-efet","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2604.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2604","reference_id":"","reference_type":"","scores":[{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82469","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82225","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.8224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82294","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82317","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82319","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.8234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.8235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82355","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82371","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82414","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82412","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82429","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790944","reference_id":"1790944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790944"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0465","reference_id":"RHSA-2020:0465","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0467","reference_id":"RHSA-2020:0467","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0468","reference_id":"RHSA-2020:0468","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0469","reference_id":"RHSA-2020:0469","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0470","reference_id":"RHSA-2020:0470","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0856","reference_id":"RHSA-2020:0856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0856"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-2604"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-spnj-gvva-efet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34421?format=json","vulnerability_id":"VCID-upb2-1jmf-3udy","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14797.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14797","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35582","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35805","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35731","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35754","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35735","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35723","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35421","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35339","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35222","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36243","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.363","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36328","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36266","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36547","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889717","reference_id":"1889717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889717"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0530","reference_id":"RHSA-2021:0530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0530"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-14797"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upb2-1jmf-3udy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34418?format=json","vulnerability_id":"VCID-vssb-tgq1-p3g8","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14782.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14782","reference_id":"","reference_type":"","scores":[{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34375","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34634","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34801","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34787","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34747","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.3451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.3449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34277","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34348","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34387","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34282","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34307","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34795","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34766","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889290","reference_id":"1889290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889290"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0717","reference_id":"RHSA-2021:0717","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0717"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0736","reference_id":"RHSA-2021:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0736"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-14782"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vssb-tgq1-p3g8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39538?format=json","vulnerability_id":"VCID-zr4f-wpm3-f3an","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2583.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2583","reference_id":"","reference_type":"","scores":[{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66752","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66971","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66907","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66885","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66911","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66781","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66871","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66827","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66856","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.6686","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66822","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66839","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66837","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66715","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66816","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66802","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790444","reference_id":"1790444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790444"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0465","reference_id":"RHSA-2020:0465","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0467","reference_id":"RHSA-2020:0467","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0468","reference_id":"RHSA-2020:0468","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0469","reference_id":"RHSA-2020:0469","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0470","reference_id":"RHSA-2020:0470","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0856","reference_id":"RHSA-2020:0856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0856"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75448?format=json","purl":"pkg:ebuild/dev-java/openjdk@8.272_p10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}],"aliases":["CVE-2020-2583"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zr4f-wpm3-f3an"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk@8.272_p10"}