Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mojarra@0?distro=trixie
Typedeb
Namespacedebian
Namemojarra
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.0.3-2
Latest_non_vulnerable_version2.2.8-6
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-132f-p6xh-4ydm
vulnerability_id VCID-132f-p6xh-4ydm
summary Oracle Mojarra uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack, a related issue to CVE-2010-2057.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4007
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55826
published_at 2026-04-21T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55672
published_at 2026-04-01T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55784
published_at 2026-04-02T12:55:00Z
3
value 0.00328
scoring_system epss
scoring_elements 0.55806
published_at 2026-04-04T12:55:00Z
4
value 0.00328
scoring_system epss
scoring_elements 0.55786
published_at 2026-04-07T12:55:00Z
5
value 0.00328
scoring_system epss
scoring_elements 0.55837
published_at 2026-04-08T12:55:00Z
6
value 0.00328
scoring_system epss
scoring_elements 0.5584
published_at 2026-04-09T12:55:00Z
7
value 0.00328
scoring_system epss
scoring_elements 0.55849
published_at 2026-04-11T12:55:00Z
8
value 0.00328
scoring_system epss
scoring_elements 0.55829
published_at 2026-04-12T12:55:00Z
9
value 0.00328
scoring_system epss
scoring_elements 0.55811
published_at 2026-04-13T12:55:00Z
10
value 0.00328
scoring_system epss
scoring_elements 0.55848
published_at 2026-04-16T12:55:00Z
11
value 0.00328
scoring_system epss
scoring_elements 0.55851
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4007
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=623799
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=623799
2
reference_url https://issues.apache.org/jira/browse/MYFACES-2749
reference_id
reference_type
scores
url https://issues.apache.org/jira/browse/MYFACES-2749
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.1:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.1_02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.1_02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.1_02:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_01:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_02:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_03:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_04:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_05:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_06:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_06:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_07:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_07:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_07:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_08:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_08:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_08:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_09:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_09:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_09:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_12:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_13:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_14:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:1.2_15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:1.2_15:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:2.0.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:2.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:2.0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra:2.0.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4007
reference_id CVE-2010-4007
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4007
fixed_packages
0
url pkg:deb/debian/mojarra@0?distro=trixie
purl pkg:deb/debian/mojarra@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@0%3Fdistro=trixie
1
url pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
purl pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@2.2.8-6%3Fdistro=trixie
aliases CVE-2010-4007
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-132f-p6xh-4ydm
1
url VCID-5sf4-cx8k-guae
vulnerability_id VCID-5sf4-cx8k-guae
summary
Cross-site Scripting in Eclipse Mojarra
faces/context/PartialViewContextImpl.java in Eclipse Mojarra, as used in Mojarra for Eclipse EE4J before 2.3.10 and Mojarra JavaServer Faces, allows Reflected XSS because a client window field is mishandled.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17091
reference_id
reference_type
scores
0
value 0.05622
scoring_system epss
scoring_elements 0.90337
published_at 2026-04-09T12:55:00Z
1
value 0.05622
scoring_system epss
scoring_elements 0.90352
published_at 2026-04-21T12:55:00Z
2
value 0.05622
scoring_system epss
scoring_elements 0.90354
published_at 2026-04-18T12:55:00Z
3
value 0.05622
scoring_system epss
scoring_elements 0.90338
published_at 2026-04-13T12:55:00Z
4
value 0.05622
scoring_system epss
scoring_elements 0.90344
published_at 2026-04-12T12:55:00Z
5
value 0.05622
scoring_system epss
scoring_elements 0.90345
published_at 2026-04-11T12:55:00Z
6
value 0.05622
scoring_system epss
scoring_elements 0.90298
published_at 2026-04-02T12:55:00Z
7
value 0.05622
scoring_system epss
scoring_elements 0.90311
published_at 2026-04-04T12:55:00Z
8
value 0.05622
scoring_system epss
scoring_elements 0.90295
published_at 2026-04-01T12:55:00Z
9
value 0.05622
scoring_system epss
scoring_elements 0.90316
published_at 2026-04-07T12:55:00Z
10
value 0.05622
scoring_system epss
scoring_elements 0.9033
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17091
1
reference_url https://bugs.eclipse.org/bugs/show_bug.cgi?id=548244
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.eclipse.org/bugs/show_bug.cgi?id=548244
2
reference_url https://github.com/eclipse-ee4j/mojarra/commit/8f70f2bd024f00ecd5b3dcca45df73edda29dcee
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/commit/8f70f2bd024f00ecd5b3dcca45df73edda29dcee
3
reference_url https://github.com/eclipse-ee4j/mojarra/commit/a3fa9573789ed5e867c43ea38374f4dbd5a8f81f
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/commit/a3fa9573789ed5e867c43ea38374f4dbd5a8f81f
4
reference_url https://github.com/eclipse-ee4j/mojarra/compare/2.3.9-RELEASE...2.3.10-RELEASE
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/compare/2.3.9-RELEASE...2.3.10-RELEASE
5
reference_url https://github.com/eclipse-ee4j/mojarra/files/3039198/advisory.txt
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/files/3039198/advisory.txt
6
reference_url https://github.com/eclipse-ee4j/mojarra/issues/4556
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/issues/4556
7
reference_url https://github.com/eclipse-ee4j/mojarra/pull/4567
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/pull/4567
8
reference_url https://github.com/javaserverfaces/mojarra/commit/ae1c234d0a6750822ac69d4ae26d90e3571f27fe
reference_id
reference_type
scores
url https://github.com/javaserverfaces/mojarra/commit/ae1c234d0a6750822ac69d4ae26d90e3571f27fe
9
reference_url https://github.com/javaserverfaces/mojarra/commit/f61935cd39f34329fbf27b1972a506fbdd0ab4d4
reference_id
reference_type
scores
url https://github.com/javaserverfaces/mojarra/commit/f61935cd39f34329fbf27b1972a506fbdd0ab4d4
10
reference_url https://github.com/javaserverfaces/mojarra/compare/2.2.19...2.2.20
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/javaserverfaces/mojarra/compare/2.2.19...2.2.20
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17091
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-17091
12
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
13
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
14
reference_url https://www.oracle.com/security-alerts/cpujan2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2021.html
15
reference_url https://www.oracle.com/security-alerts/cpujan2022.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2022.html
16
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
17
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuoct2020.html
18
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:healthcare_data_repository:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:healthcare_data_repository:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:healthcare_data_repository:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:health_sciences_information_manager:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:health_sciences_information_manager:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:health_sciences_information_manager:3.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra_javaserver_faces:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mojarra_javaserver_faces:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mojarra_javaserver_faces:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:19.12.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:19.12.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:19.12.0.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_advanced_inventory_planning:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_advanced_inventory_planning:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_advanced_inventory_planning:15.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_advanced_inventory_planning:16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_advanced_inventory_planning:16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_advanced_inventory_planning:16.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_assortment_planning:16.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_assortment_planning:16.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_assortment_planning:16.0.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_financial_integration:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_financial_integration:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_financial_integration:15.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_financial_integration:16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_financial_integration:16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_financial_integration:16.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_integration_bus:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:15.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_invoice_matching:16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_invoice_matching:16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_invoice_matching:16.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_merchandising_system:16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_merchandising_system:16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_merchandising_system:16.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_store_inventory_management:14.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_store_inventory_management:14.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_store_inventory_management:14.0.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_store_inventory_management:14.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_store_inventory_management:14.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_store_inventory_management:14.1.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_store_inventory_management:15.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_store_inventory_management:15.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_store_inventory_management:15.0.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_store_inventory_management:16.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_store_inventory_management:16.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_store_inventory_management:16.0.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:time_and_labor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:time_and_labor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:time_and_labor:*:*:*:*:*:*:*:*
56
reference_url https://github.com/advisories/GHSA-rjhx-c9qh-qh8f
reference_id GHSA-rjhx-c9qh-qh8f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rjhx-c9qh-qh8f
fixed_packages
0
url pkg:deb/debian/mojarra@0?distro=trixie
purl pkg:deb/debian/mojarra@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@0%3Fdistro=trixie
1
url pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
purl pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@2.2.8-6%3Fdistro=trixie
aliases CVE-2019-17091, GHSA-rjhx-c9qh-qh8f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sf4-cx8k-guae
2
url VCID-aj1q-r1y1-bkbh
vulnerability_id VCID-aj1q-r1y1-bkbh
summary
Directory traversal
This package allow remote attackers to read arbitrary files via a `..` in the `ln` parameter to `faces/javax.faces.resource/web.xml` or the `PATH_INFO` to `faces/javax.faces.resource/`.
references
0
reference_url http://mail-archives.apache.org/mod_mbox/myfaces-announce/201202.mbox/%3C4F33ED1F.4070007%40apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://mail-archives.apache.org/mod_mbox/myfaces-announce/201202.mbox/%3C4F33ED1F.4070007%40apache.org%3E
1
reference_url http://mail-archives.apache.org/mod_mbox/myfaces-dev/201202.mbox/%3C4F33ED1F.4070007@apache.org%3E
reference_id
reference_type
scores
url http://mail-archives.apache.org/mod_mbox/myfaces-dev/201202.mbox/%3C4F33ED1F.4070007@apache.org%3E
2
reference_url http://osvdb.org/show/osvdb/79002
reference_id
reference_type
scores
url http://osvdb.org/show/osvdb/79002
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4367.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4367.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4367
reference_id
reference_type
scores
0
value 0.8592
scoring_system epss
scoring_elements 0.99388
published_at 2026-04-11T12:55:00Z
1
value 0.8592
scoring_system epss
scoring_elements 0.9939
published_at 2026-04-21T12:55:00Z
2
value 0.8592
scoring_system epss
scoring_elements 0.99386
published_at 2026-04-08T12:55:00Z
3
value 0.8592
scoring_system epss
scoring_elements 0.99387
published_at 2026-04-09T12:55:00Z
4
value 0.8592
scoring_system epss
scoring_elements 0.99389
published_at 2026-04-13T12:55:00Z
5
value 0.8592
scoring_system epss
scoring_elements 0.99382
published_at 2026-04-02T12:55:00Z
6
value 0.8592
scoring_system epss
scoring_elements 0.99391
published_at 2026-04-16T12:55:00Z
7
value 0.8592
scoring_system epss
scoring_elements 0.99384
published_at 2026-04-04T12:55:00Z
8
value 0.8592
scoring_system epss
scoring_elements 0.99385
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4367
5
reference_url http://seclists.org/fulldisclosure/2012/Feb/150
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2012/Feb/150
6
reference_url http://secunia.com/advisories/47973
reference_id
reference_type
scores
url http://secunia.com/advisories/47973
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/73100
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/73100
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-4367
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2011-4367
9
reference_url https://web.archive.org/web/20120213042504/http://www.securityfocus.com/bid/51939
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20120213042504/http://www.securityfocus.com/bid/51939
10
reference_url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4367
reference_id
reference_type
scores
url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4367
11
reference_url http://www.securityfocus.com/bid/51939
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/51939
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1866260
reference_id 1866260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1866260
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:myfaces:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:myfaces:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:myfaces:*:*:*:*:*:*:*:*
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/36681.txt
reference_id CVE-2011-4367;OSVDB-79002
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/36681.txt
15
reference_url https://www.securityfocus.com/bid/51939/info
reference_id CVE-2011-4367;OSVDB-79002
reference_type exploit
scores
url https://www.securityfocus.com/bid/51939/info
16
reference_url https://github.com/advisories/GHSA-gjfx-9wx3-j6r7
reference_id GHSA-gjfx-9wx3-j6r7
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gjfx-9wx3-j6r7
fixed_packages
0
url pkg:deb/debian/mojarra@0?distro=trixie
purl pkg:deb/debian/mojarra@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@0%3Fdistro=trixie
1
url pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
purl pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@2.2.8-6%3Fdistro=trixie
aliases CVE-2011-4367, GHSA-gjfx-9wx3-j6r7
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aj1q-r1y1-bkbh
3
url VCID-tbhh-2tte-kkdk
vulnerability_id VCID-tbhh-2tte-kkdk
summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6950.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6950
reference_id
reference_type
scores
0
value 0.51657
scoring_system epss
scoring_elements 0.97904
published_at 2026-04-21T12:55:00Z
1
value 0.51657
scoring_system epss
scoring_elements 0.97905
published_at 2026-04-18T12:55:00Z
2
value 0.51657
scoring_system epss
scoring_elements 0.97898
published_at 2026-04-13T12:55:00Z
3
value 0.51657
scoring_system epss
scoring_elements 0.97896
published_at 2026-04-12T12:55:00Z
4
value 0.51657
scoring_system epss
scoring_elements 0.97895
published_at 2026-04-11T12:55:00Z
5
value 0.51657
scoring_system epss
scoring_elements 0.97892
published_at 2026-04-09T12:55:00Z
6
value 0.51657
scoring_system epss
scoring_elements 0.97889
published_at 2026-04-08T12:55:00Z
7
value 0.51657
scoring_system epss
scoring_elements 0.97885
published_at 2026-04-07T12:55:00Z
8
value 0.51657
scoring_system epss
scoring_elements 0.97882
published_at 2026-04-04T12:55:00Z
9
value 0.51657
scoring_system epss
scoring_elements 0.9788
published_at 2026-04-02T12:55:00Z
10
value 0.51657
scoring_system epss
scoring_elements 0.97875
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6950
2
reference_url https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943
3
reference_url https://github.com/eclipse-ee4j/mojarra
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra
4
reference_url https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741
5
reference_url https://github.com/eclipse-ee4j/mojarra/issues/4571
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/issues/4571
6
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
7
reference_url https://www.oracle.com/security-alerts/cpujan2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2022.html
8
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1805006
reference_id 1805006
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1805006
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6950
reference_id CVE-2020-6950
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-6950
11
reference_url https://github.com/advisories/GHSA-rpq8-mmwh-q9hm
reference_id GHSA-rpq8-mmwh-q9hm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rpq8-mmwh-q9hm
12
reference_url https://access.redhat.com/errata/RHSA-2020:2113
reference_id RHSA-2020:2113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2113
13
reference_url https://access.redhat.com/errata/RHSA-2020:2511
reference_id RHSA-2020:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2511
14
reference_url https://access.redhat.com/errata/RHSA-2020:2512
reference_id RHSA-2020:2512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2512
15
reference_url https://access.redhat.com/errata/RHSA-2020:2513
reference_id RHSA-2020:2513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2513
16
reference_url https://access.redhat.com/errata/RHSA-2020:2515
reference_id RHSA-2020:2515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2515
17
reference_url https://access.redhat.com/errata/RHSA-2020:2905
reference_id RHSA-2020:2905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2905
18
reference_url https://access.redhat.com/errata/RHSA-2020:3585
reference_id RHSA-2020:3585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3585
fixed_packages
0
url pkg:deb/debian/mojarra@0?distro=trixie
purl pkg:deb/debian/mojarra@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@0%3Fdistro=trixie
1
url pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
purl pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@2.2.8-6%3Fdistro=trixie
aliases CVE-2020-6950, GHSA-rpq8-mmwh-q9hm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbhh-2tte-kkdk
4
url VCID-ud7m-cc54-3qbv
vulnerability_id VCID-ud7m-cc54-3qbv
summary The getLocalePrefix function in ResourceManager.java in Eclipse Mojarra before 2.3.7 is affected by Directory Traversal via the loc parameter. A remote attacker can download configuration files or Java bytecodes from applications.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14371.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14371.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14371
reference_id
reference_type
scores
0
value 0.01625
scoring_system epss
scoring_elements 0.81897
published_at 2026-04-21T12:55:00Z
1
value 0.02476
scoring_system epss
scoring_elements 0.85301
published_at 2026-04-16T12:55:00Z
2
value 0.02476
scoring_system epss
scoring_elements 0.85281
published_at 2026-04-13T12:55:00Z
3
value 0.02476
scoring_system epss
scoring_elements 0.85284
published_at 2026-04-12T12:55:00Z
4
value 0.02476
scoring_system epss
scoring_elements 0.8521
published_at 2026-04-01T12:55:00Z
5
value 0.02476
scoring_system epss
scoring_elements 0.85286
published_at 2026-04-11T12:55:00Z
6
value 0.02476
scoring_system epss
scoring_elements 0.85271
published_at 2026-04-09T12:55:00Z
7
value 0.02476
scoring_system epss
scoring_elements 0.85221
published_at 2026-04-02T12:55:00Z
8
value 0.02476
scoring_system epss
scoring_elements 0.85263
published_at 2026-04-08T12:55:00Z
9
value 0.02476
scoring_system epss
scoring_elements 0.85241
published_at 2026-04-07T12:55:00Z
10
value 0.02476
scoring_system epss
scoring_elements 0.85239
published_at 2026-04-04T12:55:00Z
11
value 0.02476
scoring_system epss
scoring_elements 0.85302
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14371
2
reference_url https://github.com/eclipse-ee4j/mojarra/commit/1b434748d9239f42eae8aa7d37d7a0930c061e24
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/commit/1b434748d9239f42eae8aa7d37d7a0930c061e24
3
reference_url https://github.com/eclipse-ee4j/mojarra/pull/4384
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/mojarra/pull/4384
4
reference_url https://github.com/javaserverfaces/mojarra/issues/4364
reference_id
reference_type
scores
url https://github.com/javaserverfaces/mojarra/issues/4364
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607709
reference_id 1607709
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607709
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14371
reference_id CVE-2018-14371
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-14371
8
reference_url https://github.com/advisories/GHSA-43q7-q5vp-3g68
reference_id GHSA-43q7-q5vp-3g68
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-43q7-q5vp-3g68
9
reference_url https://access.redhat.com/errata/RHSA-2020:2062
reference_id RHSA-2020:2062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2062
10
reference_url https://access.redhat.com/errata/RHSA-2020:2063
reference_id RHSA-2020:2063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2063
11
reference_url https://access.redhat.com/errata/RHSA-2020:2113
reference_id RHSA-2020:2113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2113
12
reference_url https://access.redhat.com/errata/RHSA-2020:2511
reference_id RHSA-2020:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2511
13
reference_url https://access.redhat.com/errata/RHSA-2020:2512
reference_id RHSA-2020:2512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2512
14
reference_url https://access.redhat.com/errata/RHSA-2020:2513
reference_id RHSA-2020:2513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2513
15
reference_url https://access.redhat.com/errata/RHSA-2020:2515
reference_id RHSA-2020:2515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2515
16
reference_url https://access.redhat.com/errata/RHSA-2020:3585
reference_id RHSA-2020:3585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3585
fixed_packages
0
url pkg:deb/debian/mojarra@0?distro=trixie
purl pkg:deb/debian/mojarra@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@0%3Fdistro=trixie
1
url pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
purl pkg:deb/debian/mojarra@2.2.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@2.2.8-6%3Fdistro=trixie
aliases CVE-2018-14371, GHSA-43q7-q5vp-3g68
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ud7m-cc54-3qbv
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mojarra@0%3Fdistro=trixie