Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.infinispan/infinispan-core@7.1.0.CR2
Typemaven
Namespaceorg.infinispan
Nameinfinispan-core
Version7.1.0.CR2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version11.0.6.Final
Latest_non_vulnerable_version15.0.0.Dev07
Affected_by_vulnerabilities
0
url VCID-22at-v7he-fqek
vulnerability_id VCID-22at-v7he-fqek
summary
Deserialization of Untrusted Data
It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:0294
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0294
1
reference_url https://access.redhat.com/errata/RHSA-2018:0478
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0478
2
reference_url https://access.redhat.com/errata/RHSA-2018:0479
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0479
3
reference_url https://access.redhat.com/errata/RHSA-2018:0480
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0480
4
reference_url https://access.redhat.com/errata/RHSA-2018:0481
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0481
5
reference_url https://access.redhat.com/errata/RHSA-2018:0501
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0501
6
reference_url https://access.redhat.com/errata/RHSA-2019:1326
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:1326
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15089.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15089.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15089
reference_id
reference_type
scores
0
value 0.01843
scoring_system epss
scoring_elements 0.83003
published_at 2026-04-18T12:55:00Z
1
value 0.01843
scoring_system epss
scoring_elements 0.82901
published_at 2026-04-01T12:55:00Z
2
value 0.01843
scoring_system epss
scoring_elements 0.82917
published_at 2026-04-02T12:55:00Z
3
value 0.01843
scoring_system epss
scoring_elements 0.82929
published_at 2026-04-04T12:55:00Z
4
value 0.01843
scoring_system epss
scoring_elements 0.82926
published_at 2026-04-07T12:55:00Z
5
value 0.01843
scoring_system epss
scoring_elements 0.82951
published_at 2026-04-08T12:55:00Z
6
value 0.01843
scoring_system epss
scoring_elements 0.82958
published_at 2026-04-09T12:55:00Z
7
value 0.01843
scoring_system epss
scoring_elements 0.82973
published_at 2026-04-11T12:55:00Z
8
value 0.01843
scoring_system epss
scoring_elements 0.82968
published_at 2026-04-12T12:55:00Z
9
value 0.01843
scoring_system epss
scoring_elements 0.82964
published_at 2026-04-13T12:55:00Z
10
value 0.01843
scoring_system epss
scoring_elements 0.83004
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15089
9
reference_url https://github.com/infinispan/infinispan
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan
10
reference_url https://github.com/infinispan/infinispan/commit/1deadcb1c74ea0337abd5382c0150b000f6b106f
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commit/1deadcb1c74ea0337abd5382c0150b000f6b106f
11
reference_url https://github.com/infinispan/infinispan/commit/2944b0d1369a230bde88392b222921537c99331e
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commit/2944b0d1369a230bde88392b222921537c99331e
12
reference_url https://github.com/infinispan/infinispan/pull/5639
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/pull/5639
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503610
reference_id 1503610
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503610
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15089
reference_id CVE-2017-15089
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-15089
15
reference_url https://github.com/advisories/GHSA-46r5-59fg-2fjc
reference_id GHSA-46r5-59fg-2fjc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-46r5-59fg-2fjc
16
reference_url https://access.redhat.com/errata/RHSA-2020:2561
reference_id RHSA-2020:2561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2561
fixed_packages
0
url pkg:maven/org.infinispan/infinispan-core@9.2.0.CR1
purl pkg:maven/org.infinispan/infinispan-core@9.2.0.CR1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2rc-7h94-wyhb
1
vulnerability VCID-gyhd-8wsj-gyac
2
vulnerability VCID-x6xg-map7-abcg
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@9.2.0.CR1
aliases CVE-2017-15089, GHSA-46r5-59fg-2fjc
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22at-v7he-fqek
1
url VCID-f2rc-7h94-wyhb
vulnerability_id VCID-f2rc-7h94-wyhb
summary
Missing Authorization
A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25711.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25711.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25711
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.40039
published_at 2026-04-18T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.39996
published_at 2026-04-07T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.4005
published_at 2026-04-08T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40064
published_at 2026-04-09T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40074
published_at 2026-04-11T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40037
published_at 2026-04-12T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40018
published_at 2026-04-13T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40067
published_at 2026-04-16T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.39902
published_at 2026-04-01T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-02T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40075
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25711
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1897618
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1897618
3
reference_url https://security.netapp.com/advisory/ntap-20220210-0023
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220210-0023
4
reference_url https://security.netapp.com/advisory/ntap-20220210-0023/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220210-0023/
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-25711
reference_id CVE-2020-25711
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-25711
6
reference_url https://github.com/advisories/GHSA-8674-26jc-wh98
reference_id GHSA-8674-26jc-wh98
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8674-26jc-wh98
7
reference_url https://access.redhat.com/errata/RHSA-2021:0433
reference_id RHSA-2021:0433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0433
fixed_packages
0
url pkg:maven/org.infinispan/infinispan-core@11.0.6.Final
purl pkg:maven/org.infinispan/infinispan-core@11.0.6.Final
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@11.0.6.Final
aliases CVE-2020-25711, GHSA-8674-26jc-wh98
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f2rc-7h94-wyhb
2
url VCID-gyhd-8wsj-gyac
vulnerability_id VCID-gyhd-8wsj-gyac
summary
Improper implementation of the session fixation protection in Infinispan
A flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10158.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10158
reference_id
reference_type
scores
0
value 0.00509
scoring_system epss
scoring_elements 0.66385
published_at 2026-04-18T12:55:00Z
1
value 0.00509
scoring_system epss
scoring_elements 0.66369
published_at 2026-04-16T12:55:00Z
2
value 0.00509
scoring_system epss
scoring_elements 0.66333
published_at 2026-04-13T12:55:00Z
3
value 0.00509
scoring_system epss
scoring_elements 0.66364
published_at 2026-04-12T12:55:00Z
4
value 0.00509
scoring_system epss
scoring_elements 0.66377
published_at 2026-04-11T12:55:00Z
5
value 0.00509
scoring_system epss
scoring_elements 0.66357
published_at 2026-04-09T12:55:00Z
6
value 0.00509
scoring_system epss
scoring_elements 0.66343
published_at 2026-04-08T12:55:00Z
7
value 0.00509
scoring_system epss
scoring_elements 0.66299
published_at 2026-04-02T12:55:00Z
8
value 0.00509
scoring_system epss
scoring_elements 0.6626
published_at 2026-04-01T12:55:00Z
9
value 0.00509
scoring_system epss
scoring_elements 0.66296
published_at 2026-04-07T12:55:00Z
10
value 0.00509
scoring_system epss
scoring_elements 0.66326
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10158
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158
3
reference_url https://github.com/infinispan/infinispan
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan
4
reference_url https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72
5
reference_url https://github.com/infinispan/infinispan/commits/9.4.15.Final
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commits/9.4.15.Final
6
reference_url https://github.com/infinispan/infinispan/commits/9.4.15.Final/
reference_id
reference_type
scores
url https://github.com/infinispan/infinispan/commits/9.4.15.Final/
7
reference_url https://github.com/infinispan/infinispan/pull/6960
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/pull/6960
8
reference_url https://github.com/infinispan/infinispan/pull/7025
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/pull/7025
9
reference_url https://github.com/infinispan/infinispan/pull/7043
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/pull/7043
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10158
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-10158
11
reference_url https://security.netapp.com/advisory/ntap-20231227-0009
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231227-0009
12
reference_url https://security.netapp.com/advisory/ntap-20231227-0009/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20231227-0009/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1714359
reference_id 1714359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1714359
14
reference_url https://github.com/advisories/GHSA-6x3v-rw2q-9gx7
reference_id GHSA-6x3v-rw2q-9gx7
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6x3v-rw2q-9gx7
fixed_packages
0
url pkg:maven/org.infinispan/infinispan-core@9.4.15.Final
purl pkg:maven/org.infinispan/infinispan-core@9.4.15.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2rc-7h94-wyhb
1
vulnerability VCID-gyhd-8wsj-gyac
2
vulnerability VCID-x6xg-map7-abcg
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@9.4.15.Final
1
url pkg:maven/org.infinispan/infinispan-core@10.0.0
purl pkg:maven/org.infinispan/infinispan-core@10.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@10.0.0
2
url pkg:maven/org.infinispan/infinispan-core@10.0.0.Final
purl pkg:maven/org.infinispan/infinispan-core@10.0.0.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2rc-7h94-wyhb
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@10.0.0.Final
aliases CVE-2019-10158, GHSA-6x3v-rw2q-9gx7
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyhd-8wsj-gyac
3
url VCID-x6xg-map7-abcg
vulnerability_id VCID-x6xg-map7-abcg
summary
Use of Externally-Controlled Input to Select Classes or Code in Infinispan
A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan's privileges. The attacker can use reflection to introduce new, malicious behavior into the application.
references
0
reference_url https://access.redhat.com/errata/RHSA-2020:0481
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0481
1
reference_url https://access.redhat.com/errata/RHSA-2020:0727
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0727
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10174.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10174.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10174
reference_id
reference_type
scores
0
value 0.00882
scoring_system epss
scoring_elements 0.75443
published_at 2026-04-18T12:55:00Z
1
value 0.00882
scoring_system epss
scoring_elements 0.75341
published_at 2026-04-01T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75344
published_at 2026-04-02T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75377
published_at 2026-04-04T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75356
published_at 2026-04-07T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75399
published_at 2026-04-08T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75408
published_at 2026-04-09T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75429
published_at 2026-04-11T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-12T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.75396
published_at 2026-04-13T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75437
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10174
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10174
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10174
5
reference_url https://github.com/infinispan/infinispan
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan
6
reference_url https://github.com/infinispan/infinispan/commit/5dbb05cfaca01a1a66732b82a0f5ba615ccbd214
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commit/5dbb05cfaca01a1a66732b82a0f5ba615ccbd214
7
reference_url https://github.com/infinispan/infinispan/commit/7bdc2822ccf79127a488130239c49a5e944e3ca2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commit/7bdc2822ccf79127a488130239c49a5e944e3ca2
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10174
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
3
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-10174
9
reference_url https://security.netapp.com/advisory/ntap-20220210-0018
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220210-0018
10
reference_url https://security.netapp.com/advisory/ntap-20220210-0018/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220210-0018/
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1703469
reference_id 1703469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1703469
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:infinispan:infinispan:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:infinispan:infinispan:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:infinispan:infinispan:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*
reference_id cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*
reference_id cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
reference_id cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://github.com/advisories/GHSA-h47x-2j37-fw5m
reference_id GHSA-h47x-2j37-fw5m
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h47x-2j37-fw5m
26
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
27
reference_url https://access.redhat.com/errata/RHSA-2020:2062
reference_id RHSA-2020:2062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2062
28
reference_url https://access.redhat.com/errata/RHSA-2020:2063
reference_id RHSA-2020:2063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2063
29
reference_url https://access.redhat.com/errata/RHSA-2020:2113
reference_id RHSA-2020:2113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2113
30
reference_url https://access.redhat.com/errata/RHSA-2020:2333
reference_id RHSA-2020:2333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2333
31
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
fixed_packages
0
url pkg:maven/org.infinispan/infinispan-core@8.2.12.Final
purl pkg:maven/org.infinispan/infinispan-core@8.2.12.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-22at-v7he-fqek
1
vulnerability VCID-f2rc-7h94-wyhb
2
vulnerability VCID-gyhd-8wsj-gyac
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@8.2.12.Final
1
url pkg:maven/org.infinispan/infinispan-core@9.4.17.Final
purl pkg:maven/org.infinispan/infinispan-core@9.4.17.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2rc-7h94-wyhb
1
vulnerability VCID-gyhd-8wsj-gyac
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@9.4.17.Final
aliases CVE-2019-10174, GHSA-h47x-2j37-fw5m
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x6xg-map7-abcg
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@7.1.0.CR2