Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.infinispan/infinispan-core@9.0.0.Alpha2
Typemaven
Namespaceorg.infinispan
Nameinfinispan-core
Version9.0.0.Alpha2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version11.0.6.Final
Latest_non_vulnerable_version15.0.0.Dev07
Affected_by_vulnerabilities
0
url VCID-22at-v7he-fqek
vulnerability_id VCID-22at-v7he-fqek
summary
Deserialization of Untrusted Data
It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:0294
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0294
1
reference_url https://access.redhat.com/errata/RHSA-2018:0478
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0478
2
reference_url https://access.redhat.com/errata/RHSA-2018:0479
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0479
3
reference_url https://access.redhat.com/errata/RHSA-2018:0480
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0480
4
reference_url https://access.redhat.com/errata/RHSA-2018:0481
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0481
5
reference_url https://access.redhat.com/errata/RHSA-2018:0501
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0501
6
reference_url https://access.redhat.com/errata/RHSA-2019:1326
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:1326
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15089.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15089.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15089
reference_id
reference_type
scores
0
value 0.01843
scoring_system epss
scoring_elements 0.83007
published_at 2026-04-21T12:55:00Z
1
value 0.01843
scoring_system epss
scoring_elements 0.82901
published_at 2026-04-01T12:55:00Z
2
value 0.01843
scoring_system epss
scoring_elements 0.82917
published_at 2026-04-02T12:55:00Z
3
value 0.01843
scoring_system epss
scoring_elements 0.82929
published_at 2026-04-04T12:55:00Z
4
value 0.01843
scoring_system epss
scoring_elements 0.82926
published_at 2026-04-07T12:55:00Z
5
value 0.01843
scoring_system epss
scoring_elements 0.82951
published_at 2026-04-08T12:55:00Z
6
value 0.01843
scoring_system epss
scoring_elements 0.82958
published_at 2026-04-09T12:55:00Z
7
value 0.01843
scoring_system epss
scoring_elements 0.82973
published_at 2026-04-11T12:55:00Z
8
value 0.01843
scoring_system epss
scoring_elements 0.82968
published_at 2026-04-12T12:55:00Z
9
value 0.01843
scoring_system epss
scoring_elements 0.82964
published_at 2026-04-13T12:55:00Z
10
value 0.01843
scoring_system epss
scoring_elements 0.83004
published_at 2026-04-16T12:55:00Z
11
value 0.01843
scoring_system epss
scoring_elements 0.83003
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15089
9
reference_url https://github.com/infinispan/infinispan
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan
10
reference_url https://github.com/infinispan/infinispan/commit/1deadcb1c74ea0337abd5382c0150b000f6b106f
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commit/1deadcb1c74ea0337abd5382c0150b000f6b106f
11
reference_url https://github.com/infinispan/infinispan/commit/2944b0d1369a230bde88392b222921537c99331e
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commit/2944b0d1369a230bde88392b222921537c99331e
12
reference_url https://github.com/infinispan/infinispan/pull/5639
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/pull/5639
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503610
reference_id 1503610
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503610
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15089
reference_id CVE-2017-15089
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-15089
15
reference_url https://github.com/advisories/GHSA-46r5-59fg-2fjc
reference_id GHSA-46r5-59fg-2fjc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-46r5-59fg-2fjc
16
reference_url https://access.redhat.com/errata/RHSA-2020:2561
reference_id RHSA-2020:2561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2561
fixed_packages
0
url pkg:maven/org.infinispan/infinispan-core@9.2.0.CR1
purl pkg:maven/org.infinispan/infinispan-core@9.2.0.CR1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2rc-7h94-wyhb
1
vulnerability VCID-gyhd-8wsj-gyac
2
vulnerability VCID-x6xg-map7-abcg
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@9.2.0.CR1
aliases CVE-2017-15089, GHSA-46r5-59fg-2fjc
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22at-v7he-fqek
1
url VCID-f2rc-7h94-wyhb
vulnerability_id VCID-f2rc-7h94-wyhb
summary
Missing Authorization
A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25711.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25711.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25711
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.39961
published_at 2026-04-21T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.4005
published_at 2026-04-08T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40064
published_at 2026-04-09T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40074
published_at 2026-04-11T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40037
published_at 2026-04-12T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40018
published_at 2026-04-13T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40067
published_at 2026-04-16T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40039
published_at 2026-04-18T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.39902
published_at 2026-04-01T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-02T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40075
published_at 2026-04-04T12:55:00Z
11
value 0.00183
scoring_system epss
scoring_elements 0.39996
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25711
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1897618
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1897618
3
reference_url https://security.netapp.com/advisory/ntap-20220210-0023
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220210-0023
4
reference_url https://security.netapp.com/advisory/ntap-20220210-0023/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220210-0023/
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-25711
reference_id CVE-2020-25711
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-25711
6
reference_url https://github.com/advisories/GHSA-8674-26jc-wh98
reference_id GHSA-8674-26jc-wh98
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8674-26jc-wh98
7
reference_url https://access.redhat.com/errata/RHSA-2021:0433
reference_id RHSA-2021:0433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0433
fixed_packages
0
url pkg:maven/org.infinispan/infinispan-core@11.0.6.Final
purl pkg:maven/org.infinispan/infinispan-core@11.0.6.Final
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@11.0.6.Final
aliases CVE-2020-25711, GHSA-8674-26jc-wh98
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f2rc-7h94-wyhb
2
url VCID-gyhd-8wsj-gyac
vulnerability_id VCID-gyhd-8wsj-gyac
summary
Improper implementation of the session fixation protection in Infinispan
A flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10158.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10158
reference_id
reference_type
scores
0
value 0.00509
scoring_system epss
scoring_elements 0.6637
published_at 2026-04-21T12:55:00Z
1
value 0.00509
scoring_system epss
scoring_elements 0.66333
published_at 2026-04-13T12:55:00Z
2
value 0.00509
scoring_system epss
scoring_elements 0.66385
published_at 2026-04-18T12:55:00Z
3
value 0.00509
scoring_system epss
scoring_elements 0.66369
published_at 2026-04-16T12:55:00Z
4
value 0.00509
scoring_system epss
scoring_elements 0.6626
published_at 2026-04-01T12:55:00Z
5
value 0.00509
scoring_system epss
scoring_elements 0.66299
published_at 2026-04-02T12:55:00Z
6
value 0.00509
scoring_system epss
scoring_elements 0.66326
published_at 2026-04-04T12:55:00Z
7
value 0.00509
scoring_system epss
scoring_elements 0.66296
published_at 2026-04-07T12:55:00Z
8
value 0.00509
scoring_system epss
scoring_elements 0.66343
published_at 2026-04-08T12:55:00Z
9
value 0.00509
scoring_system epss
scoring_elements 0.66357
published_at 2026-04-09T12:55:00Z
10
value 0.00509
scoring_system epss
scoring_elements 0.66377
published_at 2026-04-11T12:55:00Z
11
value 0.00509
scoring_system epss
scoring_elements 0.66364
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10158
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158
3
reference_url https://github.com/infinispan/infinispan
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan
4
reference_url https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72
5
reference_url https://github.com/infinispan/infinispan/commits/9.4.15.Final
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/commits/9.4.15.Final
6
reference_url https://github.com/infinispan/infinispan/commits/9.4.15.Final/
reference_id
reference_type
scores
url https://github.com/infinispan/infinispan/commits/9.4.15.Final/
7
reference_url https://github.com/infinispan/infinispan/pull/6960
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/pull/6960
8
reference_url https://github.com/infinispan/infinispan/pull/7025
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/pull/7025
9
reference_url https://github.com/infinispan/infinispan/pull/7043
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/infinispan/infinispan/pull/7043
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10158
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-10158
11
reference_url https://security.netapp.com/advisory/ntap-20231227-0009
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231227-0009
12
reference_url https://security.netapp.com/advisory/ntap-20231227-0009/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20231227-0009/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1714359
reference_id 1714359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1714359
14
reference_url https://github.com/advisories/GHSA-6x3v-rw2q-9gx7
reference_id GHSA-6x3v-rw2q-9gx7
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6x3v-rw2q-9gx7
fixed_packages
0
url pkg:maven/org.infinispan/infinispan-core@9.4.15.Final
purl pkg:maven/org.infinispan/infinispan-core@9.4.15.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2rc-7h94-wyhb
1
vulnerability VCID-gyhd-8wsj-gyac
2
vulnerability VCID-x6xg-map7-abcg
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@9.4.15.Final
1
url pkg:maven/org.infinispan/infinispan-core@10.0.0.Final
purl pkg:maven/org.infinispan/infinispan-core@10.0.0.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f2rc-7h94-wyhb
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@10.0.0.Final
2
url pkg:maven/org.infinispan/infinispan-core@10.0.0
purl pkg:maven/org.infinispan/infinispan-core@10.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@10.0.0
aliases CVE-2019-10158, GHSA-6x3v-rw2q-9gx7
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyhd-8wsj-gyac
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.infinispan/infinispan-core@9.0.0.Alpha2