{"url":"http://public2.vulnerablecode.io/api/packages/933726?format=json","purl":"pkg:deb/debian/openjfx@11%2B26-1?distro=trixie","type":"deb","namespace":"debian","name":"openjfx","version":"11+26-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"11.0.11+0-1","latest_non_vulnerable_version":"11.0.11+1-7","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34415?format=json","vulnerability_id":"VCID-2znn-4qpa-6kbm","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14664","reference_id":"","reference_type":"","scores":[{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77658","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77734","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77754","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77753","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77747","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.7778","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77789","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77703","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1866027","reference_id":"1866027","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1866027"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-20-897/","reference_id":"ZDI-20-897","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-897/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933726?format=json","purl":"pkg:deb/debian/openjfx@11%2B26-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11%252B26-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933721?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933719?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933722?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie"}],"aliases":["CVE-2020-14664"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2znn-4qpa-6kbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78278?format=json","vulnerability_id":"VCID-a91k-9kv3-yfb9","summary":"JavaFX: unauthorized creation, deletion or modification access to critical data via multiple protocols","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22043.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22043.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22043","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48187","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48155","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48267","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48262","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48199","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48209","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48211","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48204","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48216","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224658","reference_id":"2224658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224658"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:03Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230725-0006/","reference_id":"ntap-20230725-0006","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230725-0006/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933726?format=json","purl":"pkg:deb/debian/openjfx@11%2B26-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11%252B26-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933721?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933719?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933722?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie"}],"aliases":["CVE-2023-22043"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a91k-9kv3-yfb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83283?format=json","vulnerability_id":"VCID-jvtu-gg6n-hyce","summary":"JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2941","reference_id":"","reference_type":"","scores":[{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79494","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79572","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79571","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79576","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79613","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.7951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79546","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79568","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2941"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180726-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180726-0001/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.securityfocus.com/bid/104775","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"http://www.securityfocus.com/bid/104775"},{"reference_url":"http://www.securitytracker.com/id/1041302","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"http://www.securitytracker.com/id/1041302"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602143","reference_id":"1602143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602143"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215","reference_id":"905215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2941","reference_id":"CVE-2018-2941","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-2941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2253","reference_id":"RHSA-2018:2253","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2254","reference_id":"RHSA-2018:2254","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2255","reference_id":"RHSA-2018:2255","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2256","reference_id":"RHSA-2018:2256","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2256"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933726?format=json","purl":"pkg:deb/debian/openjfx@11%2B26-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11%252B26-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933721?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933719?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933722?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie"}],"aliases":["CVE-2018-2941"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtu-gg6n-hyce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50796?format=json","vulnerability_id":"VCID-jw3n-w9gu-x3hg","summary":"Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3209.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3209","reference_id":"","reference_type":"","scores":[{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79214","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79284","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79286","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.7932","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79326","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.7923","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01242","scoring_system":"epss","scoring_elements":"0.79288","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3209"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/105590","reference_id":"105590","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"}],"url":"http://www.securityfocus.com/bid/105590"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639904","reference_id":"1639904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639904"},{"reference_url":"https://security.gentoo.org/glsa/201908-10","reference_id":"GLSA-201908-10","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"}],"url":"https://security.gentoo.org/glsa/201908-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3002","reference_id":"RHSA-2018:3002","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3003","reference_id":"RHSA-2018:3003","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3003"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933726?format=json","purl":"pkg:deb/debian/openjfx@11%2B26-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11%252B26-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933721?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933719?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933722?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie"}],"aliases":["CVE-2018-3209"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jw3n-w9gu-x3hg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45881?format=json","vulnerability_id":"VCID-yptm-3aag-fqbj","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2585.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2585","reference_id":"","reference_type":"","scores":[{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78913","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79037","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78984","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79014","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79021","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78947","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1807936","reference_id":"1807936","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1807936"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:50Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:50Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933726?format=json","purl":"pkg:deb/debian/openjfx@11%2B26-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11%252B26-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933721?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933719?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933722?format=json","purl":"pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie"}],"aliases":["CVE-2020-2585"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yptm-3aag-fqbj"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11%252B26-1%3Fdistro=trixie"}