Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7uk7-7qpn-jqaq
SummaryJDK: exposure of sensitive information using a combination of flaws and configurations
Aliases
0
alias CVE-2023-30441
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1?arch=el8_6
purl pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1?arch=el8_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7uk7-7qpn-jqaq
1
vulnerability VCID-u9xe-x4f1-9fc8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1%3Farch=el8_6
1
url pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1jpp.1?arch=el7
purl pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1jpp.1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7uk7-7qpn-jqaq
1
vulnerability VCID-u9xe-x4f1-9fc8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1jpp.1%3Farch=el7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30441.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30441
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15276
published_at 2026-04-02T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15167
published_at 2026-04-24T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15345
published_at 2026-04-04T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15148
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15236
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15287
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15257
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15219
published_at 2026-04-12T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15155
published_at 2026-04-13T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15078
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15128
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30441
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188465
reference_id 2188465
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188465
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/253188
reference_id 253188
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/
url https://exchange.xforce.ibmcloud.com/vulnerabilities/253188
4
reference_url https://www.ibm.com/support/pages/node/6985011
reference_id 6985011
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/
url https://www.ibm.com/support/pages/node/6985011
5
reference_url https://www.ibm.com/support/pages/node/6986617
reference_id 6986617
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/
url https://www.ibm.com/support/pages/node/6986617
6
reference_url https://www.ibm.com/support/pages/node/6986637
reference_id 6986637
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/
url https://www.ibm.com/support/pages/node/6986637
7
reference_url https://www.ibm.com/support/pages/node/6987167
reference_id 6987167
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/
url https://www.ibm.com/support/pages/node/6987167
8
reference_url https://access.redhat.com/errata/RHSA-2022:6735
reference_id RHSA-2022:6735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6735
9
reference_url https://access.redhat.com/errata/RHSA-2022:6756
reference_id RHSA-2022:6756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6756
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
1
cwe_id 327
name Use of a Broken or Risky Cryptographic Algorithm
description The product uses a broken or risky cryptographic algorithm or protocol.
Exploits
Severity_range_score7.5 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7uk7-7qpn-jqaq