Lookup for vulnerable packages by Package URL.

GET /api/packages/198822?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/198822?format=api",
    "purl": "pkg:maven/org.infinispan/infinispan-core@8.1.3.Final",
    "type": "maven",
    "namespace": "org.infinispan",
    "name": "infinispan-core",
    "version": "8.1.3.Final",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "11.0.6.Final",
    "latest_non_vulnerable_version": "15.0.0.Dev07",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15745?format=api",
            "vulnerability_id": "VCID-22at-v7he-fqek",
            "summary": "Deserialization of Untrusted Data\nIt was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0478"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0479"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0480"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0501",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0501"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1326"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15089.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15089.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82901",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82917",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82929",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82926",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82951",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82958",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82973",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82968",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82964",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83004",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83003",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15089"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/commit/1deadcb1c74ea0337abd5382c0150b000f6b106f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/commit/1deadcb1c74ea0337abd5382c0150b000f6b106f"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/commit/2944b0d1369a230bde88392b222921537c99331e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/commit/2944b0d1369a230bde88392b222921537c99331e"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/pull/5639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/pull/5639"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503610",
                    "reference_id": "1503610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503610"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15089",
                    "reference_id": "CVE-2017-15089",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15089"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-46r5-59fg-2fjc",
                    "reference_id": "GHSA-46r5-59fg-2fjc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-46r5-59fg-2fjc"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2561",
                    "reference_id": "RHSA-2020:2561",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2561"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54948?format=api",
                    "purl": "pkg:maven/org.infinispan/infinispan-core@9.2.0.CR1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f2rc-7h94-wyhb"
                        },
                        {
                            "vulnerability": "VCID-gyhd-8wsj-gyac"
                        },
                        {
                            "vulnerability": "VCID-x6xg-map7-abcg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@9.2.0.CR1"
                }
            ],
            "aliases": [
                "CVE-2017-15089",
                "GHSA-46r5-59fg-2fjc"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22at-v7he-fqek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12675?format=api",
            "vulnerability_id": "VCID-f2rc-7h94-wyhb",
            "summary": "Missing Authorization\nA flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25711.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25711.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39961",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4005",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40064",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40074",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40037",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40018",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40067",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40039",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39902",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40049",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40075",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39996",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25711"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897618"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220210-0023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220210-0023"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220210-0023/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20220210-0023/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25711",
                    "reference_id": "CVE-2020-25711",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25711"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8674-26jc-wh98",
                    "reference_id": "GHSA-8674-26jc-wh98",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8674-26jc-wh98"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0433",
                    "reference_id": "RHSA-2021:0433",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0433"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/45576?format=api",
                    "purl": "pkg:maven/org.infinispan/infinispan-core@11.0.6.Final",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@11.0.6.Final"
                }
            ],
            "aliases": [
                "CVE-2020-25711",
                "GHSA-8674-26jc-wh98"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f2rc-7h94-wyhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33186?format=api",
            "vulnerability_id": "VCID-gyhd-8wsj-gyac",
            "summary": "Improper implementation of the session fixation protection in Infinispan\nA flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10158.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10158.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6637",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66333",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66385",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66369",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6626",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66299",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66326",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66296",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66343",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66357",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66377",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66364",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10158"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/commits/9.4.15.Final",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/commits/9.4.15.Final"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/commits/9.4.15.Final/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/infinispan/infinispan/commits/9.4.15.Final/"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/pull/6960",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/pull/6960"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/pull/7025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/pull/7025"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/pull/7043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/pull/7043"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10158"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20231227-0009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20231227-0009"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20231227-0009/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20231227-0009/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1714359",
                    "reference_id": "1714359",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1714359"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-6x3v-rw2q-9gx7",
                    "reference_id": "GHSA-6x3v-rw2q-9gx7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-6x3v-rw2q-9gx7"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73019?format=api",
                    "purl": "pkg:maven/org.infinispan/infinispan-core@9.4.15.Final",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f2rc-7h94-wyhb"
                        },
                        {
                            "vulnerability": "VCID-gyhd-8wsj-gyac"
                        },
                        {
                            "vulnerability": "VCID-x6xg-map7-abcg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@9.4.15.Final"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/568806?format=api",
                    "purl": "pkg:maven/org.infinispan/infinispan-core@10.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@10.0.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/198924?format=api",
                    "purl": "pkg:maven/org.infinispan/infinispan-core@10.0.0.Final",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f2rc-7h94-wyhb"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@10.0.0.Final"
                }
            ],
            "aliases": [
                "CVE-2019-10158",
                "GHSA-6x3v-rw2q-9gx7"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gyhd-8wsj-gyac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57840?format=api",
            "vulnerability_id": "VCID-x6xg-map7-abcg",
            "summary": "Use of Externally-Controlled Input to Select Classes or Code in Infinispan\nA vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan's privileges. The attacker can use reflection to introduce new, malicious behavior into the application.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0727"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10174.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10174.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75432",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75341",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75344",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75377",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75356",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75399",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75408",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75429",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75407",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75396",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75437",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75443",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10174"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10174"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/commit/5dbb05cfaca01a1a66732b82a0f5ba615ccbd214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/commit/5dbb05cfaca01a1a66732b82a0f5ba615ccbd214"
                },
                {
                    "reference_url": "https://github.com/infinispan/infinispan/commit/7bdc2822ccf79127a488130239c49a5e944e3ca2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/infinispan/infinispan/commit/7bdc2822ccf79127a488130239c49a5e944e3ca2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220210-0018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220210-0018"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220210-0018/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20220210-0018/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469",
                    "reference_id": "1703469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:infinispan:infinispan:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:infinispan:infinispan:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:infinispan:infinispan:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-h47x-2j37-fw5m",
                    "reference_id": "GHSA-h47x-2j37-fw5m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-h47x-2j37-fw5m"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0983",
                    "reference_id": "RHSA-2020:0983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0983"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2062",
                    "reference_id": "RHSA-2020:2062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2063",
                    "reference_id": "RHSA-2020:2063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2063"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2113",
                    "reference_id": "RHSA-2020:2113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2333",
                    "reference_id": "RHSA-2020:2333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2333"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856",
                    "reference_id": "RHSA-2024:5856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5856"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84010?format=api",
                    "purl": "pkg:maven/org.infinispan/infinispan-core@8.2.12.Final",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22at-v7he-fqek"
                        },
                        {
                            "vulnerability": "VCID-f2rc-7h94-wyhb"
                        },
                        {
                            "vulnerability": "VCID-gyhd-8wsj-gyac"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@8.2.12.Final"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84011?format=api",
                    "purl": "pkg:maven/org.infinispan/infinispan-core@9.4.17.Final",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f2rc-7h94-wyhb"
                        },
                        {
                            "vulnerability": "VCID-gyhd-8wsj-gyac"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@9.4.17.Final"
                }
            ],
            "aliases": [
                "CVE-2019-10174",
                "GHSA-h47x-2j37-fw5m"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x6xg-map7-abcg"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@8.1.3.Final"
}