Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/eap7-wildfly-elytron@1.10.8-1.Final_redhat_00001.1?arch=el7eap
Typerpm
Namespaceredhat
Nameeap7-wildfly-elytron
Version1.10.8-1.Final_redhat_00001.1
Qualifiers
arch el7eap
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-c3c2-b2bc-6bdh
vulnerability_id VCID-c3c2-b2bc-6bdh
summary
Improper Input Validation
A flaw was found in Wildfly's implementation of Xerces, specifically in the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the "use-grammar-pool-only" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as CVE-2020-14621, which affected OpenJDK, and uses a similar code. This flaw affects all Xerces JBoss versions before 2.12.0.SP3.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14338.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14338.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14338
reference_id
reference_type
scores
0
value 0.00388
scoring_system epss
scoring_elements 0.59929
published_at 2026-04-16T12:55:00Z
1
value 0.00388
scoring_system epss
scoring_elements 0.59868
published_at 2026-04-04T12:55:00Z
2
value 0.00388
scoring_system epss
scoring_elements 0.59838
published_at 2026-04-07T12:55:00Z
3
value 0.00388
scoring_system epss
scoring_elements 0.59889
published_at 2026-04-08T12:55:00Z
4
value 0.00388
scoring_system epss
scoring_elements 0.59902
published_at 2026-04-09T12:55:00Z
5
value 0.00388
scoring_system epss
scoring_elements 0.59924
published_at 2026-04-11T12:55:00Z
6
value 0.00388
scoring_system epss
scoring_elements 0.59908
published_at 2026-04-12T12:55:00Z
7
value 0.00388
scoring_system epss
scoring_elements 0.5989
published_at 2026-04-13T12:55:00Z
8
value 0.00388
scoring_system epss
scoring_elements 0.5977
published_at 2026-04-01T12:55:00Z
9
value 0.00388
scoring_system epss
scoring_elements 0.59843
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14338
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1860054
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1860054
3
reference_url https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103@%3Cj-users.xerces.apache.org%3E
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103@%3Cj-users.xerces.apache.org%3E
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-14338
reference_id CVE-2020-14338
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-14338
5
reference_url https://github.com/advisories/GHSA-w4jq-qh47-hvjq
reference_id GHSA-w4jq-qh47-hvjq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w4jq-qh47-hvjq
6
reference_url https://access.redhat.com/errata/RHSA-2020:4244
reference_id RHSA-2020:4244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4244
7
reference_url https://access.redhat.com/errata/RHSA-2020:4245
reference_id RHSA-2020:4245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4245
8
reference_url https://access.redhat.com/errata/RHSA-2020:4246
reference_id RHSA-2020:4246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4246
9
reference_url https://access.redhat.com/errata/RHSA-2020:4247
reference_id RHSA-2020:4247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4247
10
reference_url https://access.redhat.com/errata/RHSA-2020:4931
reference_id RHSA-2020:4931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4931
11
reference_url https://access.redhat.com/errata/RHSA-2020:5361
reference_id RHSA-2020:5361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5361
12
reference_url https://access.redhat.com/errata/RHSA-2021:0600
reference_id RHSA-2021:0600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0600
13
reference_url https://access.redhat.com/errata/RHSA-2021:0603
reference_id RHSA-2021:0603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0603
fixed_packages
aliases CVE-2020-14338, GHSA-w4jq-qh47-hvjq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3c2-b2bc-6bdh
1
url VCID-fekg-fn5e-augk
vulnerability_id VCID-fekg-fn5e-augk
summary
Exposure of Sensitive Information to an Unauthorized Actor in Apache CXF
Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the ‘createMBServerConnectorFactory‘ property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1954.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1954
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44297
published_at 2026-04-16T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44174
published_at 2026-04-01T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44239
published_at 2026-04-02T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44262
published_at 2026-04-04T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44195
published_at 2026-04-07T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44247
published_at 2026-04-08T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44252
published_at 2026-04-09T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.4427
published_at 2026-04-11T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44237
published_at 2026-04-12T12:55:00Z
9
value 0.00216
scoring_system epss
scoring_elements 0.44238
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1954
2
reference_url https://github.com/apache/cxf/commit/1cf4fed546904a4a2560f53a2a2391d834b4026c
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/cxf/commit/1cf4fed546904a4a2560f53a2a2391d834b4026c
3
reference_url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E
4
reference_url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
9
reference_url https://security.netapp.com/advisory/ntap-20220210-0001
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220210-0001
10
reference_url https://security.netapp.com/advisory/ntap-20220210-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220210-0001/
11
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2020.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824301
reference_id 1824301
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824301
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\::*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\::*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\::*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1954
reference_id CVE-2020-1954
reference_type
scores
0
value 2.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-1954
24
reference_url http://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2
reference_id CVE-2020-1954.TXT.ASC?VERSION=1&MODIFICATIONDATE=1585730169000&API=V2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2
25
reference_url https://github.com/advisories/GHSA-ffm7-7r8g-77xm
reference_id GHSA-ffm7-7r8g-77xm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-ffm7-7r8g-77xm
26
reference_url https://access.redhat.com/errata/RHSA-2020:3585
reference_id RHSA-2020:3585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3585
27
reference_url https://access.redhat.com/errata/RHSA-2020:4244
reference_id RHSA-2020:4244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4244
28
reference_url https://access.redhat.com/errata/RHSA-2020:4245
reference_id RHSA-2020:4245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4245
29
reference_url https://access.redhat.com/errata/RHSA-2020:4246
reference_id RHSA-2020:4246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4246
30
reference_url https://access.redhat.com/errata/RHSA-2020:4247
reference_id RHSA-2020:4247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4247
31
reference_url https://access.redhat.com/errata/RHSA-2020:4931
reference_id RHSA-2020:4931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4931
32
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
33
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
fixed_packages
aliases CVE-2020-1954, GHSA-ffm7-7r8g-77xm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fekg-fn5e-augk
2
url VCID-jcvv-g8kh-ffag
vulnerability_id VCID-jcvv-g8kh-ffag
summary
Uncontrolled Resource Consumption in XNIO
A vulnerability was discovered in XNIO where file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. It may allow the attacker to cause a denial of service. It affects XNIO versions 3.6.0.Beta1 through 3.8.1.Final.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14340.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14340
reference_id
reference_type
scores
0
value 0.0033
scoring_system epss
scoring_elements 0.56038
published_at 2026-04-16T12:55:00Z
1
value 0.0033
scoring_system epss
scoring_elements 0.56002
published_at 2026-04-13T12:55:00Z
2
value 0.0033
scoring_system epss
scoring_elements 0.5602
published_at 2026-04-12T12:55:00Z
3
value 0.0033
scoring_system epss
scoring_elements 0.5604
published_at 2026-04-11T12:55:00Z
4
value 0.0033
scoring_system epss
scoring_elements 0.56029
published_at 2026-04-09T12:55:00Z
5
value 0.0033
scoring_system epss
scoring_elements 0.55975
published_at 2026-04-07T12:55:00Z
6
value 0.0033
scoring_system epss
scoring_elements 0.55976
published_at 2026-04-02T12:55:00Z
7
value 0.0033
scoring_system epss
scoring_elements 0.55997
published_at 2026-04-04T12:55:00Z
8
value 0.0033
scoring_system epss
scoring_elements 0.55865
published_at 2026-04-01T12:55:00Z
9
value 0.0033
scoring_system epss
scoring_elements 0.56027
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14340
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1860218
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1860218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14340
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-14340
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-14340
5
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
6
reference_url https://www.oracle.com/security-alerts/cpujan2022.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2022.html
7
reference_url https://github.com/advisories/GHSA-c738-77x8-wmq5
reference_id GHSA-c738-77x8-wmq5
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c738-77x8-wmq5
8
reference_url https://access.redhat.com/errata/RHSA-2020:4244
reference_id RHSA-2020:4244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4244
9
reference_url https://access.redhat.com/errata/RHSA-2020:4245
reference_id RHSA-2020:4245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4245
10
reference_url https://access.redhat.com/errata/RHSA-2020:4246
reference_id RHSA-2020:4246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4246
11
reference_url https://access.redhat.com/errata/RHSA-2020:4247
reference_id RHSA-2020:4247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4247
12
reference_url https://access.redhat.com/errata/RHSA-2020:4931
reference_id RHSA-2020:4931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4931
13
reference_url https://access.redhat.com/errata/RHSA-2020:5361
reference_id RHSA-2020:5361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5361
fixed_packages
aliases CVE-2020-14340, GHSA-c738-77x8-wmq5
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jcvv-g8kh-ffag
3
url VCID-whfh-hycv-7yft
vulnerability_id VCID-whfh-hycv-7yft
summary picketbox: JBoss EAP reload to admin-only mode allows authentication bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14299.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14299.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14299
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42539
published_at 2026-04-01T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.4261
published_at 2026-04-02T12:55:00Z
2
value 0.00205
scoring_system epss
scoring_elements 0.42639
published_at 2026-04-04T12:55:00Z
3
value 0.00205
scoring_system epss
scoring_elements 0.42578
published_at 2026-04-07T12:55:00Z
4
value 0.00205
scoring_system epss
scoring_elements 0.4263
published_at 2026-04-08T12:55:00Z
5
value 0.00205
scoring_system epss
scoring_elements 0.42641
published_at 2026-04-09T12:55:00Z
6
value 0.00205
scoring_system epss
scoring_elements 0.42664
published_at 2026-04-11T12:55:00Z
7
value 0.00205
scoring_system epss
scoring_elements 0.42628
published_at 2026-04-12T12:55:00Z
8
value 0.00205
scoring_system epss
scoring_elements 0.426
published_at 2026-04-13T12:55:00Z
9
value 0.00205
scoring_system epss
scoring_elements 0.42659
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14299
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1848533
reference_id 1848533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1848533
3
reference_url https://access.redhat.com/errata/RHSA-2020:4244
reference_id RHSA-2020:4244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4244
4
reference_url https://access.redhat.com/errata/RHSA-2020:4245
reference_id RHSA-2020:4245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4245
5
reference_url https://access.redhat.com/errata/RHSA-2020:4246
reference_id RHSA-2020:4246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4246
6
reference_url https://access.redhat.com/errata/RHSA-2020:4247
reference_id RHSA-2020:4247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4247
7
reference_url https://access.redhat.com/errata/RHSA-2020:4931
reference_id RHSA-2020:4931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4931
8
reference_url https://access.redhat.com/errata/RHSA-2020:5361
reference_id RHSA-2020:5361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5361
fixed_packages
aliases CVE-2020-14299
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whfh-hycv-7yft
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap7-wildfly-elytron@1.10.8-1.Final_redhat_00001.1%3Farch=el7eap