Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jgroups/jgroups@4.0.0.Final
Typemaven
Namespaceorg.jgroups
Namejgroups
Version4.0.0.Final
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-h873-uz9q-ebcr
vulnerability_id VCID-h873-uz9q-ebcr
summary It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1435.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1435.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1439.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1439.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2035.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-2035.html
3
reference_url https://access.redhat.com/errata/RHSA-2016:1345
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1345
4
reference_url https://access.redhat.com/errata/RHSA-2016:1346
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1346
5
reference_url https://access.redhat.com/errata/RHSA-2016:1347
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1347
6
reference_url https://access.redhat.com/errata/RHSA-2016:1374
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1374
7
reference_url https://access.redhat.com/errata/RHSA-2016:1376
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1376
8
reference_url https://access.redhat.com/errata/RHSA-2016:1389
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1389
9
reference_url https://access.redhat.com/errata/RHSA-2016:1432
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1432
10
reference_url https://access.redhat.com/errata/RHSA-2016:1433
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1433
11
reference_url https://access.redhat.com/errata/RHSA-2016:1434
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1434
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2141.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2141.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2141
reference_id
reference_type
scores
0
value 0.02357
scoring_system epss
scoring_elements 0.84841
published_at 2026-04-01T12:55:00Z
1
value 0.02357
scoring_system epss
scoring_elements 0.84925
published_at 2026-04-11T12:55:00Z
2
value 0.02357
scoring_system epss
scoring_elements 0.84923
published_at 2026-04-12T12:55:00Z
3
value 0.02357
scoring_system epss
scoring_elements 0.84917
published_at 2026-04-13T12:55:00Z
4
value 0.02357
scoring_system epss
scoring_elements 0.84856
published_at 2026-04-02T12:55:00Z
5
value 0.02357
scoring_system epss
scoring_elements 0.84875
published_at 2026-04-04T12:55:00Z
6
value 0.02357
scoring_system epss
scoring_elements 0.84876
published_at 2026-04-07T12:55:00Z
7
value 0.02357
scoring_system epss
scoring_elements 0.84899
published_at 2026-04-08T12:55:00Z
8
value 0.02357
scoring_system epss
scoring_elements 0.84907
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2141
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1313589
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1313589
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2141
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://github.com/belaban/JGroups
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/belaban/JGroups
18
reference_url https://github.com/belaban/JGroups/commit/38a882331035ffed205d15a5c92b471fd09659c
reference_id
reference_type
scores
url https://github.com/belaban/JGroups/commit/38a882331035ffed205d15a5c92b471fd09659c
19
reference_url https://github.com/belaban/JGroups/commit/c3ad22234ef84d06d04d908b3c94c0d11df8afd
reference_id
reference_type
scores
url https://github.com/belaban/JGroups/commit/c3ad22234ef84d06d04d908b3c94c0d11df8afd
20
reference_url https://github.com/belaban/JGroups/commit/eeaf5241cce464ef21a2dfc4938729ade9ebef36
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/belaban/JGroups/commit/eeaf5241cce464ef21a2dfc4938729ade9ebef36
21
reference_url https://github.com/belaban/JGroups/commit/fba182c14075789e1d2c976d50d9018c671ad0b
reference_id
reference_type
scores
url https://github.com/belaban/JGroups/commit/fba182c14075789e1d2c976d50d9018c671ad0b
22
reference_url https://issues.jboss.org/browse/JGRP-2021
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://issues.jboss.org/browse/JGRP-2021
23
reference_url https://issues.redhat.com/browse/JGRP-2055
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/JGRP-2055
24
reference_url https://issues.redhat.com/browse/JGRP-2074
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/JGRP-2074
25
reference_url https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a@%3Cdev.geode.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a@%3Cdev.geode.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a%40%3Cdev.geode.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a%40%3Cdev.geode.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0@%3Cdev.geode.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0@%3Cdev.geode.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0%40%3Cdev.geode.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0%40%3Cdev.geode.apache.org%3E
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2141
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-2141
30
reference_url https://rhn.redhat.com/errata/RHSA-2016-1328.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1328.html
31
reference_url https://rhn.redhat.com/errata/RHSA-2016-1329.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1329.html
32
reference_url https://rhn.redhat.com/errata/RHSA-2016-1330.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1330.html
33
reference_url https://rhn.redhat.com/errata/RHSA-2016-1331.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1331.html
34
reference_url https://rhn.redhat.com/errata/RHSA-2016-1332.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1332.html
35
reference_url https://rhn.redhat.com/errata/RHSA-2016-1333.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1333.html
36
reference_url https://rhn.redhat.com/errata/RHSA-2016-1334.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1334.html
37
reference_url https://web.archive.org/web/20161013163606/http://www.securityfocus.com/bid/91481
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20161013163606/http://www.securityfocus.com/bid/91481
38
reference_url https://web.archive.org/web/20201207092245/http://www.securitytracker.com/id/1036165
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201207092245/http://www.securitytracker.com/id/1036165
39
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
40
reference_url http://www.securityfocus.com/bid/91481
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91481
41
reference_url http://www.securitytracker.com/id/1036165
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036165
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867493
reference_id 867493
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867493
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jgroups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jgroups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jgroups:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
50
reference_url https://github.com/advisories/GHSA-rc7h-x6cq-988q
reference_id GHSA-rc7h-x6cq-988q
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rc7h-x6cq-988q
51
reference_url https://access.redhat.com/errata/RHSA-2016:1328
reference_id RHSA-2016:1328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1328
52
reference_url https://access.redhat.com/errata/RHSA-2016:1329
reference_id RHSA-2016:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1329
53
reference_url https://access.redhat.com/errata/RHSA-2016:1330
reference_id RHSA-2016:1330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1330
54
reference_url https://access.redhat.com/errata/RHSA-2016:1331
reference_id RHSA-2016:1331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1331
55
reference_url https://access.redhat.com/errata/RHSA-2016:1332
reference_id RHSA-2016:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1332
56
reference_url https://access.redhat.com/errata/RHSA-2016:1333
reference_id RHSA-2016:1333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1333
57
reference_url https://access.redhat.com/errata/RHSA-2016:1334
reference_id RHSA-2016:1334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1334
58
reference_url https://access.redhat.com/errata/RHSA-2016:1435
reference_id RHSA-2016:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1435
59
reference_url https://access.redhat.com/errata/RHSA-2016:1439
reference_id RHSA-2016:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1439
60
reference_url https://access.redhat.com/errata/RHSA-2016:2035
reference_id RHSA-2016:2035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2035
fixed_packages
0
url pkg:maven/org.jgroups/jgroups@3.2.16.Final
purl pkg:maven/org.jgroups/jgroups@3.2.16.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h873-uz9q-ebcr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@3.2.16.Final
1
url pkg:maven/org.jgroups/jgroups@3.6.10.Final
purl pkg:maven/org.jgroups/jgroups@3.6.10.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h873-uz9q-ebcr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@3.6.10.Final
2
url pkg:maven/org.jgroups/jgroups@4.0
purl pkg:maven/org.jgroups/jgroups@4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@4.0
3
url pkg:maven/org.jgroups/jgroups@4.0.0.Final
purl pkg:maven/org.jgroups/jgroups@4.0.0.Final
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@4.0.0.Final
aliases CVE-2016-2141, GHSA-rc7h-x6cq-988q
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h873-uz9q-ebcr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@4.0.0.Final