Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
Typedeb
Namespacedebian
Nameopenjdk-21
Version21.0.11~8ea-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version21.0.11~9ea-1
Latest_non_vulnerable_version21.0.11~9ea-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-11vj-5zz4-6fe7
vulnerability_id VCID-11vj-5zz4-6fe7
summary openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30698
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69565
published_at 2026-04-02T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69621
published_at 2026-04-13T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69627
published_at 2026-04-09T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.6965
published_at 2026-04-11T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-12T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69581
published_at 2026-04-04T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.6956
published_at 2026-04-07T12:55:00Z
7
value 0.00605
scoring_system epss
scoring_elements 0.69611
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359693
reference_id 2359693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359693
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:13:36Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://access.redhat.com/errata/RHSA-2025:8063
reference_id RHSA-2025:8063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8063
25
reference_url https://access.redhat.com/errata/RHSA-2025:8431
reference_id RHSA-2025:8431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8431
26
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
27
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
28
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
29
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
30
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
31
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
32
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.7%252B6-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-30698
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-11vj-5zz4-6fe7
1
url VCID-13t7-vubq-8kae
vulnerability_id VCID-13t7-vubq-8kae
summary openjdk: Enhance certificate handling (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53057
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22702
published_at 2026-04-02T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22587
published_at 2026-04-13T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22666
published_at 2026-04-09T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22683
published_at 2026-04-11T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22642
published_at 2026-04-12T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22747
published_at 2026-04-04T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22535
published_at 2026-04-07T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22612
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53057
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
reference_id 1118944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403082
reference_id 2403082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403082
6
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T14:46:38Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:18814
reference_id RHSA-2025:18814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18814
8
reference_url https://access.redhat.com/errata/RHSA-2025:18815
reference_id RHSA-2025:18815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18815
9
reference_url https://access.redhat.com/errata/RHSA-2025:18816
reference_id RHSA-2025:18816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18816
10
reference_url https://access.redhat.com/errata/RHSA-2025:18817
reference_id RHSA-2025:18817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18817
11
reference_url https://access.redhat.com/errata/RHSA-2025:18818
reference_id RHSA-2025:18818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18818
12
reference_url https://access.redhat.com/errata/RHSA-2025:18819
reference_id RHSA-2025:18819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18819
13
reference_url https://access.redhat.com/errata/RHSA-2025:18820
reference_id RHSA-2025:18820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18820
14
reference_url https://access.redhat.com/errata/RHSA-2025:18821
reference_id RHSA-2025:18821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18821
15
reference_url https://access.redhat.com/errata/RHSA-2025:18822
reference_id RHSA-2025:18822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18822
16
reference_url https://access.redhat.com/errata/RHSA-2025:18823
reference_id RHSA-2025:18823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18823
17
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
18
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
19
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
20
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
21
reference_url https://access.redhat.com/errata/RHSA-2025:22370
reference_id RHSA-2025:22370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22370
22
reference_url https://access.redhat.com/errata/RHSA-2025:22672
reference_id RHSA-2025:22672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22672
23
reference_url https://usn.ubuntu.com/7881-1/
reference_id USN-7881-1
reference_type
scores
url https://usn.ubuntu.com/7881-1/
24
reference_url https://usn.ubuntu.com/7882-1/
reference_id USN-7882-1
reference_type
scores
url https://usn.ubuntu.com/7882-1/
25
reference_url https://usn.ubuntu.com/7883-1/
reference_id USN-7883-1
reference_type
scores
url https://usn.ubuntu.com/7883-1/
26
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
27
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
28
reference_url https://usn.ubuntu.com/7900-1/
reference_id USN-7900-1
reference_type
scores
url https://usn.ubuntu.com/7900-1/
29
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
30
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-53057
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13t7-vubq-8kae
2
url VCID-2tju-1r8k-sbf9
vulnerability_id VCID-2tju-1r8k-sbf9
summary OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61756
published_at 2026-04-13T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.617
published_at 2026-04-02T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-04T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61701
published_at 2026-04-07T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.6175
published_at 2026-04-08T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61766
published_at 2026-04-09T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61787
published_at 2026-04-11T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61775
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
reference_id 2275005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
25
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
26
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
27
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
28
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
29
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
30
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
31
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
32
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
33
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
34
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
35
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
36
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
37
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
38
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
39
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
40
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
41
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
42
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
43
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21094
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tju-1r8k-sbf9
3
url VCID-3tav-ffar-hfhb
vulnerability_id VCID-3tav-ffar-hfhb
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-02T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30566
published_at 2026-04-13T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30561
published_at 2026-04-07T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30619
published_at 2026-04-08T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30653
published_at 2026-04-09T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30658
published_at 2026-04-11T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30613
published_at 2026-04-12T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.3075
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
reference_id 2160475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0203
reference_id RHSA-2023:0203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0203
27
reference_url https://access.redhat.com/errata/RHSA-2023:0204
reference_id RHSA-2023:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0204
28
reference_url https://access.redhat.com/errata/RHSA-2023:0205
reference_id RHSA-2023:0205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0205
29
reference_url https://access.redhat.com/errata/RHSA-2023:0206
reference_id RHSA-2023:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0206
30
reference_url https://access.redhat.com/errata/RHSA-2023:0207
reference_id RHSA-2023:0207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0207
31
reference_url https://access.redhat.com/errata/RHSA-2023:0208
reference_id RHSA-2023:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0208
32
reference_url https://access.redhat.com/errata/RHSA-2023:0209
reference_id RHSA-2023:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0209
33
reference_url https://access.redhat.com/errata/RHSA-2023:0210
reference_id RHSA-2023:0210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0210
34
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
35
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
36
reference_url https://access.redhat.com/errata/RHSA-2023:0354
reference_id RHSA-2023:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0354
37
reference_url https://access.redhat.com/errata/RHSA-2023:0387
reference_id RHSA-2023:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0387
38
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
39
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
40
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
41
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
42
reference_url https://usn.ubuntu.com/5898-1/
reference_id USN-5898-1
reference_type
scores
url https://usn.ubuntu.com/5898-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21~7ea-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2023-21843
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tav-ffar-hfhb
4
url VCID-4snj-etwf-eqe8
vulnerability_id VCID-4snj-etwf-eqe8
summary openjdk: Improve HttpServer Request handling (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21933
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09035
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09077
published_at 2026-04-13T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09121
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09122
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09091
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09086
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.0901
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.0909
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429926
reference_id 2429926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429926
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:56:13Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2026-21933
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4snj-etwf-eqe8
5
url VCID-5et1-ytak-xqh7
vulnerability_id VCID-5et1-ytak-xqh7
summary OpenJDK: Excessive symbol length can lead to infinite loop (8319859)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.5617
published_at 2026-04-13T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56165
published_at 2026-04-04T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56195
published_at 2026-04-08T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56201
published_at 2026-04-09T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.5621
published_at 2026-04-11T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56186
published_at 2026-04-12T12:55:00Z
6
value 0.00333
scoring_system epss
scoring_elements 0.56144
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
reference_id 2297962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21138
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5et1-ytak-xqh7
6
url VCID-6196-gvhx-ruh8
vulnerability_id VCID-6196-gvhx-ruh8
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38305
published_at 2026-04-07T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38417
published_at 2026-04-02T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38441
published_at 2026-04-04T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38355
published_at 2026-04-08T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38363
published_at 2026-04-09T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.3838
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44159
published_at 2026-04-13T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44158
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
reference_id 2318534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.5%252B11-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21235
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6196-gvhx-ruh8
7
url VCID-76rb-sg3r-bqce
vulnerability_id VCID-76rb-sg3r-bqce
summary OpenJDK: potential UTF8 size overflow (8314794)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63286
published_at 2026-04-13T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63252
published_at 2026-04-07T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63303
published_at 2026-04-08T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63321
published_at 2026-04-09T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63338
published_at 2026-04-11T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-12T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63258
published_at 2026-04-02T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63287
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
reference_id 2297961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21131
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76rb-sg3r-bqce
8
url VCID-8cup-qnc8-wudx
vulnerability_id VCID-8cup-qnc8-wudx
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55466
published_at 2026-04-13T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55441
published_at 2026-04-02T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55465
published_at 2026-04-04T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55444
published_at 2026-04-07T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55495
published_at 2026-04-09T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55505
published_at 2026-04-11T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55483
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
reference_id 2257837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-20952
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cup-qnc8-wudx
9
url VCID-9n5v-4daz-eyc2
vulnerability_id VCID-9n5v-4daz-eyc2
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26611
published_at 2026-04-13T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26708
published_at 2026-04-09T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26713
published_at 2026-04-11T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26668
published_at 2026-04-12T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26767
published_at 2026-04-02T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26807
published_at 2026-04-04T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26591
published_at 2026-04-07T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26658
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
reference_id 2318530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.5%252B11-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21217
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5v-4daz-eyc2
10
url VCID-9urr-3gt2-mfhe
vulnerability_id VCID-9urr-3gt2-mfhe
summary OpenJDK: long Exception message leading to crash (8319851)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.567
published_at 2026-04-13T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.5668
published_at 2026-04-07T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56701
published_at 2026-04-04T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56732
published_at 2026-04-08T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-09T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56745
published_at 2026-04-11T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.56721
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
reference_id 2274977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
25
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
26
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
27
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
28
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
29
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
30
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
31
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
32
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
33
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
34
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
35
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
36
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
37
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
38
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
39
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
40
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
41
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21011
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9urr-3gt2-mfhe
11
url VCID-a282-ksr4-j3cu
vulnerability_id VCID-a282-ksr4-j3cu
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26809
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26849
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26634
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26702
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26753
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26756
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26712
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26655
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
reference_id 2243627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
6
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
7
reference_url https://access.redhat.com/errata/RHSA-2023:5725
reference_id RHSA-2023:5725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5725
8
reference_url https://access.redhat.com/errata/RHSA-2023:5726
reference_id RHSA-2023:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5726
9
reference_url https://access.redhat.com/errata/RHSA-2023:5727
reference_id RHSA-2023:5727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5727
10
reference_url https://access.redhat.com/errata/RHSA-2023:5728
reference_id RHSA-2023:5728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5728
11
reference_url https://access.redhat.com/errata/RHSA-2023:5729
reference_id RHSA-2023:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5729
12
reference_url https://access.redhat.com/errata/RHSA-2023:5730
reference_id RHSA-2023:5730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5730
13
reference_url https://access.redhat.com/errata/RHSA-2023:5731
reference_id RHSA-2023:5731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5731
14
reference_url https://access.redhat.com/errata/RHSA-2023:5732
reference_id RHSA-2023:5732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5732
15
reference_url https://access.redhat.com/errata/RHSA-2023:5733
reference_id RHSA-2023:5733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5733
16
reference_url https://access.redhat.com/errata/RHSA-2023:5734
reference_id RHSA-2023:5734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5734
17
reference_url https://access.redhat.com/errata/RHSA-2023:5735
reference_id RHSA-2023:5735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5735
18
reference_url https://access.redhat.com/errata/RHSA-2023:5736
reference_id RHSA-2023:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5736
19
reference_url https://access.redhat.com/errata/RHSA-2023:5737
reference_id RHSA-2023:5737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5737
20
reference_url https://access.redhat.com/errata/RHSA-2023:5739
reference_id RHSA-2023:5739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5739
21
reference_url https://access.redhat.com/errata/RHSA-2023:5740
reference_id RHSA-2023:5740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5740
22
reference_url https://access.redhat.com/errata/RHSA-2023:5741
reference_id RHSA-2023:5741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5741
23
reference_url https://access.redhat.com/errata/RHSA-2023:5742
reference_id RHSA-2023:5742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5742
24
reference_url https://access.redhat.com/errata/RHSA-2023:5743
reference_id RHSA-2023:5743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5743
25
reference_url https://access.redhat.com/errata/RHSA-2023:5744
reference_id RHSA-2023:5744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5744
26
reference_url https://access.redhat.com/errata/RHSA-2023:5745
reference_id RHSA-2023:5745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5745
27
reference_url https://access.redhat.com/errata/RHSA-2023:5746
reference_id RHSA-2023:5746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5746
28
reference_url https://access.redhat.com/errata/RHSA-2023:5747
reference_id RHSA-2023:5747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5747
29
reference_url https://access.redhat.com/errata/RHSA-2023:5750
reference_id RHSA-2023:5750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5750
30
reference_url https://access.redhat.com/errata/RHSA-2023:5751
reference_id RHSA-2023:5751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5751
31
reference_url https://access.redhat.com/errata/RHSA-2023:5752
reference_id RHSA-2023:5752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5752
32
reference_url https://access.redhat.com/errata/RHSA-2023:5753
reference_id RHSA-2023:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5753
33
reference_url https://access.redhat.com/errata/RHSA-2023:5761
reference_id RHSA-2023:5761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5761
34
reference_url https://access.redhat.com/errata/RHSA-2023:6738
reference_id RHSA-2023:6738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6738
35
reference_url https://access.redhat.com/errata/RHSA-2023:6887
reference_id RHSA-2023:6887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6887
36
reference_url https://access.redhat.com/errata/RHSA-2024:0866
reference_id RHSA-2024:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0866
37
reference_url https://access.redhat.com/errata/RHSA-2024:0879
reference_id RHSA-2024:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0879
38
reference_url https://usn.ubuntu.com/6527-1/
reference_id USN-6527-1
reference_type
scores
url https://usn.ubuntu.com/6527-1/
39
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.1%2B12-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.1%2B12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.1%252B12-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2023-22081
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a282-ksr4-j3cu
12
url VCID-a3xk-3wya-s3gm
vulnerability_id VCID-a3xk-3wya-s3gm
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.23206
published_at 2026-04-02T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.2325
published_at 2026-04-04T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23039
published_at 2026-04-07T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23112
published_at 2026-04-08T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23165
published_at 2026-04-09T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23185
published_at 2026-04-11T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23147
published_at 2026-04-12T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23089
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
reference_id 2160421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
27
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
28
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
29
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
30
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21~7ea-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2023-21835
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3xk-3wya-s3gm
13
url VCID-apsn-z1br-3bdy
vulnerability_id VCID-apsn-z1br-3bdy
summary openjdk: Enhance Certificate Checking (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21945
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16874
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16728
published_at 2026-04-13T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16854
published_at 2026-04-09T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16832
published_at 2026-04-11T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16786
published_at 2026-04-12T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.1693
published_at 2026-04-04T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16714
published_at 2026-04-07T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16799
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429927
reference_id 2429927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429927
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:04:39Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2026-21945
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apsn-z1br-3bdy
14
url VCID-b32x-4pu4-jkh4
vulnerability_id VCID-b32x-4pu4-jkh4
summary openjdk: Better Glyph drawing (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30749
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.6625
published_at 2026-04-02T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66247
published_at 2026-04-07T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66277
published_at 2026-04-04T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66294
published_at 2026-04-08T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66307
published_at 2026-04-09T12:55:00Z
5
value 0.00672
scoring_system epss
scoring_elements 0.71372
published_at 2026-04-12T12:55:00Z
6
value 0.00672
scoring_system epss
scoring_elements 0.71355
published_at 2026-04-13T12:55:00Z
7
value 0.00672
scoring_system epss
scoring_elements 0.71388
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376783
reference_id 2376783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376783
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:23:21Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
22
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
23
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
24
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
25
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
26
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
27
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
28
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.8%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-30749
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b32x-4pu4-jkh4
15
url VCID-duy9-6f1p-vqah
vulnerability_id VCID-duy9-6f1p-vqah
summary openjdk: Enhance Handling of URIs (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21932
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09259
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09314
published_at 2026-04-13T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09346
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09356
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09328
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0931
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09227
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09302
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429925
reference_id 2429925
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429925
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:55:36Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
8
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
9
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
10
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
11
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
12
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
13
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
14
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
15
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
16
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
17
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
18
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
19
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2026-21932
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-duy9-6f1p-vqah
16
url VCID-e6dm-6767-9kdk
vulnerability_id VCID-e6dm-6767-9kdk
summary openjdk: Improve HTTP client header handling (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32274
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32136
published_at 2026-04-07T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32311
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32185
published_at 2026-04-08T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32212
published_at 2026-04-09T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32631
published_at 2026-04-12T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32603
published_at 2026-04-13T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32669
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
reference_id 2376785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:42:42Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
7
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
8
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
9
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
10
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
11
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
12
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
13
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
14
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
15
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
16
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
17
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
18
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
19
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
20
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
21
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
22
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.8%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-50059
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6dm-6767-9kdk
17
url VCID-ecr4-rqud-gyhf
vulnerability_id VCID-ecr4-rqud-gyhf
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21830.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21830
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.3205
published_at 2026-04-02T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.3209
published_at 2026-04-04T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31913
published_at 2026-04-07T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31964
published_at 2026-04-08T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31993
published_at 2026-04-09T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31997
published_at 2026-04-11T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31957
published_at 2026-04-12T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31923
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21830
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160490
reference_id 2160490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160490
4
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
5
reference_url https://access.redhat.com/errata/RHSA-2023:0203
reference_id RHSA-2023:0203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0203
6
reference_url https://access.redhat.com/errata/RHSA-2023:0204
reference_id RHSA-2023:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0204
7
reference_url https://access.redhat.com/errata/RHSA-2023:0205
reference_id RHSA-2023:0205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0205
8
reference_url https://access.redhat.com/errata/RHSA-2023:0206
reference_id RHSA-2023:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0206
9
reference_url https://access.redhat.com/errata/RHSA-2023:0207
reference_id RHSA-2023:0207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0207
10
reference_url https://access.redhat.com/errata/RHSA-2023:0208
reference_id RHSA-2023:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0208
11
reference_url https://access.redhat.com/errata/RHSA-2023:0209
reference_id RHSA-2023:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0209
12
reference_url https://access.redhat.com/errata/RHSA-2023:0210
reference_id RHSA-2023:0210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0210
13
reference_url https://access.redhat.com/errata/RHSA-2023:0354
reference_id RHSA-2023:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0354
14
reference_url https://access.redhat.com/errata/RHSA-2023:0387
reference_id RHSA-2023:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0387
15
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
16
reference_url https://usn.ubuntu.com/5898-1/
reference_id USN-5898-1
reference_type
scores
url https://usn.ubuntu.com/5898-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21~7ea-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2023-21830
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ecr4-rqud-gyhf
18
url VCID-fau4-ajny-nfbd
vulnerability_id VCID-fau4-ajny-nfbd
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40536
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40563
published_at 2026-04-08T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40574
published_at 2026-04-09T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40556
published_at 2026-04-12T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-02T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40592
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40513
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
reference_id 2257859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-20921
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fau4-ajny-nfbd
19
url VCID-fwk5-wqvn-4qaz
vulnerability_id VCID-fwk5-wqvn-4qaz
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
reference_id
reference_type
scores
0
value 0.00211
scoring_system epss
scoring_elements 0.43651
published_at 2026-04-13T12:55:00Z
1
value 0.00211
scoring_system epss
scoring_elements 0.43665
published_at 2026-04-02T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.4369
published_at 2026-04-04T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.43625
published_at 2026-04-07T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.43676
published_at 2026-04-08T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.4368
published_at 2026-04-09T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.437
published_at 2026-04-11T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43668
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
reference_id 2257850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
29
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
30
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
31
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
32
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
33
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
34
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-20926
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwk5-wqvn-4qaz
20
url VCID-gwnq-we51-3bey
vulnerability_id VCID-gwnq-we51-3bey
summary openjdk: Enhance String handling (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61748.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61748.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-61748
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.0979
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09821
published_at 2026-04-13T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09865
published_at 2026-04-09T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09872
published_at 2026-04-11T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09837
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.0984
published_at 2026-04-04T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09741
published_at 2026-04-07T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09812
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-61748
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403064
reference_id 2403064
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403064
4
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T16:58:40Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
5
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
6
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
7
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
8
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
9
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
10
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
11
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
12
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-61748
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwnq-we51-3bey
21
url VCID-h7n1-qfs3-v3fw
vulnerability_id VCID-h7n1-qfs3-v3fw
summary OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3498
published_at 2026-04-13T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35055
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-04T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.34962
published_at 2026-04-07T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35007
published_at 2026-04-08T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35036
published_at 2026-04-09T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-11T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35004
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
reference_id 2274975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
19
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
20
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
21
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
22
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
23
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
24
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
25
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
26
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
27
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
28
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
29
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
30
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
31
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
32
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
33
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21012
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7n1-qfs3-v3fw
22
url VCID-jztz-7cuw-t7ep
vulnerability_id VCID-jztz-7cuw-t7ep
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12193
published_at 2026-04-13T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.1226
published_at 2026-04-09T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12267
published_at 2026-04-11T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12229
published_at 2026-04-12T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12285
published_at 2026-04-02T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12331
published_at 2026-04-04T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.1213
published_at 2026-04-07T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12211
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
reference_id 2257874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-20945
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jztz-7cuw-t7ep
23
url VCID-mt9c-tby1-wqe9
vulnerability_id VCID-mt9c-tby1-wqe9
summary openjdk: Improve JMX connections (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21925
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10163
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10232
published_at 2026-04-13T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.1026
published_at 2026-04-09T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10292
published_at 2026-04-11T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10251
published_at 2026-04-12T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10229
published_at 2026-04-04T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10125
published_at 2026-04-07T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.102
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429924
reference_id 2429924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429924
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:50:27Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2026-21925
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mt9c-tby1-wqe9
24
url VCID-n71d-tx76-vbbd
vulnerability_id VCID-n71d-tx76-vbbd
summary OpenJDK: Out-of-bounds access in 2D image handling (8324559)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.6363
published_at 2026-04-13T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63636
published_at 2026-04-04T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63595
published_at 2026-04-07T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63647
published_at 2026-04-08T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63663
published_at 2026-04-12T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63678
published_at 2026-04-11T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
reference_id 2297976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21145
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n71d-tx76-vbbd
25
url VCID-nr6u-aysf-7kgk
vulnerability_id VCID-nr6u-aysf-7kgk
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
reference_id
reference_type
scores
0
value 0.0017
scoring_system epss
scoring_elements 0.38196
published_at 2026-04-13T12:55:00Z
1
value 0.0017
scoring_system epss
scoring_elements 0.38237
published_at 2026-04-09T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.38255
published_at 2026-04-11T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.3822
published_at 2026-04-12T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38286
published_at 2026-04-02T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38309
published_at 2026-04-04T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.38178
published_at 2026-04-07T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.38228
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
reference_id 2257853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
39
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
40
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
41
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-20919
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nr6u-aysf-7kgk
26
url VCID-ntga-y6cv-a3df
vulnerability_id VCID-ntga-y6cv-a3df
summary openjdk: Enhance array handling (Oracle CPU 2025-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-02T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42054
published_at 2026-04-13T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42094
published_at 2026-04-09T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42116
published_at 2026-04-11T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42079
published_at 2026-04-12T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42092
published_at 2026-04-04T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42029
published_at 2026-04-07T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42081
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
reference_id 2338992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
15
reference_url https://www.oracle.com/security-alerts/cpujan2025.html
reference_id cpujan2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:29:12Z/
url https://www.oracle.com/security-alerts/cpujan2025.html
16
reference_url https://access.redhat.com/errata/RHSA-2025:0421
reference_id RHSA-2025:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0421
17
reference_url https://access.redhat.com/errata/RHSA-2025:0422
reference_id RHSA-2025:0422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0422
18
reference_url https://access.redhat.com/errata/RHSA-2025:0423
reference_id RHSA-2025:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0423
19
reference_url https://access.redhat.com/errata/RHSA-2025:0424
reference_id RHSA-2025:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0424
20
reference_url https://access.redhat.com/errata/RHSA-2025:0425
reference_id RHSA-2025:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0425
21
reference_url https://access.redhat.com/errata/RHSA-2025:0426
reference_id RHSA-2025:0426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0426
22
reference_url https://access.redhat.com/errata/RHSA-2025:0427
reference_id RHSA-2025:0427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0427
23
reference_url https://access.redhat.com/errata/RHSA-2025:0428
reference_id RHSA-2025:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0428
24
reference_url https://access.redhat.com/errata/RHSA-2025:0429
reference_id RHSA-2025:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0429
25
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
26
reference_url https://access.redhat.com/errata/RHSA-2025:2615
reference_id RHSA-2025:2615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2615
27
reference_url https://usn.ubuntu.com/7252-1/
reference_id USN-7252-1
reference_type
scores
url https://usn.ubuntu.com/7252-1/
28
reference_url https://usn.ubuntu.com/7253-1/
reference_id USN-7253-1
reference_type
scores
url https://usn.ubuntu.com/7253-1/
29
reference_url https://usn.ubuntu.com/7254-1/
reference_id USN-7254-1
reference_type
scores
url https://usn.ubuntu.com/7254-1/
30
reference_url https://usn.ubuntu.com/7255-1/
reference_id USN-7255-1
reference_type
scores
url https://usn.ubuntu.com/7255-1/
31
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
32
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.6%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.6%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.6%252B7-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-21502
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ntga-y6cv-a3df
27
url VCID-nxx8-nehy-qyhg
vulnerability_id VCID-nxx8-nehy-qyhg
summary openjdk: Enhance Path Factories (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53066
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17286
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17132
published_at 2026-04-13T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17263
published_at 2026-04-09T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17241
published_at 2026-04-11T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17193
published_at 2026-04-12T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17335
published_at 2026-04-04T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17115
published_at 2026-04-07T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17207
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
reference_id 1118944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403063
reference_id 2403063
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403063
6
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T19:44:34Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:18814
reference_id RHSA-2025:18814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18814
8
reference_url https://access.redhat.com/errata/RHSA-2025:18815
reference_id RHSA-2025:18815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18815
9
reference_url https://access.redhat.com/errata/RHSA-2025:18816
reference_id RHSA-2025:18816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18816
10
reference_url https://access.redhat.com/errata/RHSA-2025:18817
reference_id RHSA-2025:18817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18817
11
reference_url https://access.redhat.com/errata/RHSA-2025:18818
reference_id RHSA-2025:18818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18818
12
reference_url https://access.redhat.com/errata/RHSA-2025:18819
reference_id RHSA-2025:18819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18819
13
reference_url https://access.redhat.com/errata/RHSA-2025:18820
reference_id RHSA-2025:18820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18820
14
reference_url https://access.redhat.com/errata/RHSA-2025:18821
reference_id RHSA-2025:18821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18821
15
reference_url https://access.redhat.com/errata/RHSA-2025:18822
reference_id RHSA-2025:18822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18822
16
reference_url https://access.redhat.com/errata/RHSA-2025:18823
reference_id RHSA-2025:18823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18823
17
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
18
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
19
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
20
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
21
reference_url https://access.redhat.com/errata/RHSA-2025:22370
reference_id RHSA-2025:22370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22370
22
reference_url https://access.redhat.com/errata/RHSA-2025:22672
reference_id RHSA-2025:22672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22672
23
reference_url https://usn.ubuntu.com/7881-1/
reference_id USN-7881-1
reference_type
scores
url https://usn.ubuntu.com/7881-1/
24
reference_url https://usn.ubuntu.com/7882-1/
reference_id USN-7882-1
reference_type
scores
url https://usn.ubuntu.com/7882-1/
25
reference_url https://usn.ubuntu.com/7883-1/
reference_id USN-7883-1
reference_type
scores
url https://usn.ubuntu.com/7883-1/
26
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
27
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
28
reference_url https://usn.ubuntu.com/7900-1/
reference_id USN-7900-1
reference_type
scores
url https://usn.ubuntu.com/7900-1/
29
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
30
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-53066
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxx8-nehy-qyhg
28
url VCID-p9na-7jta-9yg4
vulnerability_id VCID-p9na-7jta-9yg4
summary openjdk: Enhance TLS protocol support (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30754
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.3003
published_at 2026-04-02T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.29891
published_at 2026-04-07T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.30077
published_at 2026-04-04T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.29952
published_at 2026-04-08T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.29988
published_at 2026-04-09T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30352
published_at 2026-04-12T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30305
published_at 2026-04-13T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30396
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30754
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376784
reference_id 2376784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376784
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T15:31:20Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
22
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
23
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
24
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
25
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
26
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
27
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.8%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-30754
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9na-7jta-9yg4
29
url VCID-rggy-f3va-mfay
vulnerability_id VCID-rggy-f3va-mfay
summary OpenJDK: RangeCheckElimination array index overflow (8323231)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
reference_id
reference_type
scores
0
value 0.00721
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-13T12:55:00Z
1
value 0.00721
scoring_system epss
scoring_elements 0.72434
published_at 2026-04-07T12:55:00Z
2
value 0.00721
scoring_system epss
scoring_elements 0.72472
published_at 2026-04-08T12:55:00Z
3
value 0.00721
scoring_system epss
scoring_elements 0.72485
published_at 2026-04-09T12:55:00Z
4
value 0.00721
scoring_system epss
scoring_elements 0.72508
published_at 2026-04-11T12:55:00Z
5
value 0.00721
scoring_system epss
scoring_elements 0.7249
published_at 2026-04-12T12:55:00Z
6
value 0.00721
scoring_system epss
scoring_elements 0.7244
published_at 2026-04-02T12:55:00Z
7
value 0.00721
scoring_system epss
scoring_elements 0.72458
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
reference_id 2297977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21147
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rggy-f3va-mfay
30
url VCID-u81s-cs95-4yhx
vulnerability_id VCID-u81s-cs95-4yhx
summary openjdk: Better TLS connection support (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21587
reference_id
reference_type
scores
0
value 0.00575
scoring_system epss
scoring_elements 0.687
published_at 2026-04-02T12:55:00Z
1
value 0.00575
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-13T12:55:00Z
2
value 0.00575
scoring_system epss
scoring_elements 0.68767
published_at 2026-04-09T12:55:00Z
3
value 0.00575
scoring_system epss
scoring_elements 0.68789
published_at 2026-04-11T12:55:00Z
4
value 0.00575
scoring_system epss
scoring_elements 0.68775
published_at 2026-04-12T12:55:00Z
5
value 0.00575
scoring_system epss
scoring_elements 0.68718
published_at 2026-04-04T12:55:00Z
6
value 0.00575
scoring_system epss
scoring_elements 0.68696
published_at 2026-04-07T12:55:00Z
7
value 0.00575
scoring_system epss
scoring_elements 0.68748
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21587
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359695
reference_id 2359695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359695
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-17T03:55:41Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://access.redhat.com/errata/RHSA-2025:8063
reference_id RHSA-2025:8063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8063
25
reference_url https://access.redhat.com/errata/RHSA-2025:8431
reference_id RHSA-2025:8431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8431
26
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
27
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
28
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
29
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
30
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
31
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
32
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.7%252B6-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-21587
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u81s-cs95-4yhx
31
url VCID-vbw8-4j9f-eya5
vulnerability_id VCID-vbw8-4j9f-eya5
summary openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50106
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.46067
published_at 2026-04-02T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.46035
published_at 2026-04-07T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.46088
published_at 2026-04-04T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.46091
published_at 2026-04-08T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.46089
published_at 2026-04-09T12:55:00Z
5
value 0.00259
scoring_system epss
scoring_elements 0.4924
published_at 2026-04-12T12:55:00Z
6
value 0.00259
scoring_system epss
scoring_elements 0.49245
published_at 2026-04-13T12:55:00Z
7
value 0.00259
scoring_system epss
scoring_elements 0.49267
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379031
reference_id 2379031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379031
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:22:48Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
22
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
23
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
24
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
25
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
26
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
27
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
28
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.8%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-50106
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbw8-4j9f-eya5
32
url VCID-vpnc-yu7r-bqb6
vulnerability_id VCID-vpnc-yu7r-bqb6
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17036
published_at 2026-04-13T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17169
published_at 2026-04-09T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17144
published_at 2026-04-11T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17096
published_at 2026-04-12T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.1719
published_at 2026-04-02T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17241
published_at 2026-04-04T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17021
published_at 2026-04-07T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17111
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
reference_id 2318526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.5%252B11-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21208
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpnc-yu7r-bqb6
33
url VCID-vuhe-re6z-8kax
vulnerability_id VCID-vuhe-re6z-8kax
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22025.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22025
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32344
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32217
published_at 2026-04-13T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32382
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32207
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32256
published_at 2026-04-08T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32285
published_at 2026-04-09T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32286
published_at 2026-04-11T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32248
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243805
reference_id 2243805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243805
6
reference_url https://www.debian.org/security/2023/dsa-5548
reference_id dsa-5548
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:29Z/
url https://www.debian.org/security/2023/dsa-5548
7
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
8
reference_url https://security.netapp.com/advisory/ntap-20231027-0006/
reference_id ntap-20231027-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:29Z/
url https://security.netapp.com/advisory/ntap-20231027-0006/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5745
reference_id RHSA-2023:5745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5745
10
reference_url https://access.redhat.com/errata/RHSA-2023:5746
reference_id RHSA-2023:5746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5746
11
reference_url https://access.redhat.com/errata/RHSA-2023:5747
reference_id RHSA-2023:5747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5747
12
reference_url https://access.redhat.com/errata/RHSA-2023:5750
reference_id RHSA-2023:5750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5750
13
reference_url https://access.redhat.com/errata/RHSA-2023:5751
reference_id RHSA-2023:5751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5751
14
reference_url https://access.redhat.com/errata/RHSA-2023:5752
reference_id RHSA-2023:5752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5752
15
reference_url https://access.redhat.com/errata/RHSA-2023:5753
reference_id RHSA-2023:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5753
16
reference_url https://access.redhat.com/errata/RHSA-2023:6738
reference_id RHSA-2023:6738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6738
17
reference_url https://access.redhat.com/errata/RHSA-2023:6887
reference_id RHSA-2023:6887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6887
18
reference_url https://usn.ubuntu.com/6527-1/
reference_id USN-6527-1
reference_type
scores
url https://usn.ubuntu.com/6527-1/
19
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.1%2B12-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.1%2B12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.1%252B12-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2023-22025
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vuhe-re6z-8kax
34
url VCID-wn4r-ugaa-5ydb
vulnerability_id VCID-wn4r-ugaa-5ydb
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46944
published_at 2026-04-13T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46923
published_at 2026-04-02T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.4694
published_at 2026-04-04T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46888
published_at 2026-04-07T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46942
published_at 2026-04-08T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46939
published_at 2026-04-09T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46963
published_at 2026-04-11T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46936
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
reference_id 2257728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-20918
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wn4r-ugaa-5ydb
35
url VCID-y8bc-k5qu-c7f5
vulnerability_id VCID-y8bc-k5qu-c7f5
summary openjdk: Improve compiler transformations (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30691
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-02T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58814
published_at 2026-04-13T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58827
published_at 2026-04-08T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58833
published_at 2026-04-12T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58851
published_at 2026-04-11T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-04T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58775
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359694
reference_id 2359694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359694
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:24:18Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
25
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
26
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
27
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
28
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
29
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
30
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.7%252B6-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2025-30691
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8bc-k5qu-c7f5
36
url VCID-z356-tw9t-q7bp
vulnerability_id VCID-z356-tw9t-q7bp
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34648
published_at 2026-04-13T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34708
published_at 2026-04-09T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-11T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-12T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-02T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34758
published_at 2026-04-04T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34636
published_at 2026-04-07T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
reference_id 2318524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
12
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
13
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
14
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
15
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
16
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
17
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
18
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
19
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
20
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
21
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
22
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
23
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
24
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
25
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
26
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
27
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
28
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
29
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
30
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
31
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
32
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
33
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
34
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.5%252B11-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21210
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z356-tw9t-q7bp
37
url VCID-zdra-bzqn-4ug9
vulnerability_id VCID-zdra-bzqn-4ug9
summary OpenJDK: integer overflow in C1 compiler address generation (8322122)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-13T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67576
published_at 2026-04-02T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67597
published_at 2026-04-04T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67575
published_at 2026-04-07T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67627
published_at 2026-04-08T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.6764
published_at 2026-04-09T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67663
published_at 2026-04-11T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67648
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
reference_id 2275003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
19
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
21
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
22
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
23
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
24
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
25
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
26
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
27
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
28
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
29
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
30
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
31
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
32
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
33
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
34
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
35
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
36
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
37
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
38
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
39
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
40
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21068
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdra-bzqn-4ug9
38
url VCID-zgpr-3zft-zqgt
vulnerability_id VCID-zgpr-3zft-zqgt
summary OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-13T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-07T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68525
published_at 2026-04-08T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68543
published_at 2026-04-09T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68569
published_at 2026-04-11T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.68556
published_at 2026-04-12T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.68479
published_at 2026-04-02T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68498
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
reference_id 2297963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
aliases CVE-2024-21140
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgpr-3zft-zqgt
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie