Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-6gct-aw9u-puct
SummaryJDK: Unrestricted access to diagnostic operations
Aliases
0
alias CVE-2019-17631
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.6.0-1jpp.1?arch=el7
purl pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.6.0-1jpp.1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39gh-uwky-kke9
1
vulnerability VCID-64zz-esk6-y3fy
2
vulnerability VCID-6gct-aw9u-puct
3
vulnerability VCID-74uc-nfy5-fbfx
4
vulnerability VCID-chp9-6c8n-xufp
5
vulnerability VCID-gmsf-fz6q-xffa
6
vulnerability VCID-hg8h-z7af-pqe3
7
vulnerability VCID-jr6p-7nkg-1fe9
8
vulnerability VCID-kd25-3buc-cqdy
9
vulnerability VCID-nw7e-6j5f-ebfa
10
vulnerability VCID-wz73-dwgr-3bf7
11
vulnerability VCID-x3wp-bdkr-7fa8
12
vulnerability VCID-y78f-qgn6-rua7
13
vulnerability VCID-yvf2-2a33-zqat
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.6.0-1jpp.1%3Farch=el7
1
url pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.6.0-1jpp.1?arch=el6_10
purl pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.6.0-1jpp.1?arch=el6_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39gh-uwky-kke9
1
vulnerability VCID-64zz-esk6-y3fy
2
vulnerability VCID-6gct-aw9u-puct
3
vulnerability VCID-74uc-nfy5-fbfx
4
vulnerability VCID-chp9-6c8n-xufp
5
vulnerability VCID-gmsf-fz6q-xffa
6
vulnerability VCID-hg8h-z7af-pqe3
7
vulnerability VCID-jr6p-7nkg-1fe9
8
vulnerability VCID-kd25-3buc-cqdy
9
vulnerability VCID-nw7e-6j5f-ebfa
10
vulnerability VCID-wz73-dwgr-3bf7
11
vulnerability VCID-x3wp-bdkr-7fa8
12
vulnerability VCID-y78f-qgn6-rua7
13
vulnerability VCID-yvf2-2a33-zqat
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.6.0-1jpp.1%3Farch=el6_10
2
url pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.6.0-3?arch=el8_1
purl pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.6.0-3?arch=el8_1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39gh-uwky-kke9
1
vulnerability VCID-64zz-esk6-y3fy
2
vulnerability VCID-6gct-aw9u-puct
3
vulnerability VCID-74uc-nfy5-fbfx
4
vulnerability VCID-chp9-6c8n-xufp
5
vulnerability VCID-gmsf-fz6q-xffa
6
vulnerability VCID-hg8h-z7af-pqe3
7
vulnerability VCID-jr6p-7nkg-1fe9
8
vulnerability VCID-kd25-3buc-cqdy
9
vulnerability VCID-nw7e-6j5f-ebfa
10
vulnerability VCID-wz73-dwgr-3bf7
11
vulnerability VCID-x3wp-bdkr-7fa8
12
vulnerability VCID-y78f-qgn6-rua7
13
vulnerability VCID-yvf2-2a33-zqat
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.6.0-3%3Farch=el8_1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17631.json
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17631
reference_id
reference_type
scores
0
value 0.00497
scoring_system epss
scoring_elements 0.65747
published_at 2026-04-01T12:55:00Z
1
value 0.00497
scoring_system epss
scoring_elements 0.65865
published_at 2026-04-16T12:55:00Z
2
value 0.00497
scoring_system epss
scoring_elements 0.65862
published_at 2026-04-12T12:55:00Z
3
value 0.00497
scoring_system epss
scoring_elements 0.65832
published_at 2026-04-13T12:55:00Z
4
value 0.00497
scoring_system epss
scoring_elements 0.65797
published_at 2026-04-02T12:55:00Z
5
value 0.00497
scoring_system epss
scoring_elements 0.65827
published_at 2026-04-04T12:55:00Z
6
value 0.00497
scoring_system epss
scoring_elements 0.65791
published_at 2026-04-07T12:55:00Z
7
value 0.00497
scoring_system epss
scoring_elements 0.65844
published_at 2026-04-08T12:55:00Z
8
value 0.00497
scoring_system epss
scoring_elements 0.65856
published_at 2026-04-09T12:55:00Z
9
value 0.00497
scoring_system epss
scoring_elements 0.65875
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17631
2
reference_url https://bugs.eclipse.org/bugs/show_bug.cgi?id=552129
reference_id
reference_type
scores
url https://bugs.eclipse.org/bugs/show_bug.cgi?id=552129
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779880
reference_id 1779880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779880
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17631
reference_id CVE-2019-17631
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
1
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17631
15
reference_url https://access.redhat.com/errata/RHSA-2019:4113
reference_id RHSA-2019:4113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4113
16
reference_url https://access.redhat.com/errata/RHSA-2019:4115
reference_id RHSA-2019:4115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4115
17
reference_url https://access.redhat.com/errata/RHSA-2020:0006
reference_id RHSA-2020:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0006
18
reference_url https://access.redhat.com/errata/RHSA-2020:0046
reference_id RHSA-2020:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0046
Weaknesses
0
cwe_id 285
name Improper Authorization
description The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
1
cwe_id 269
name Improper Privilege Management
description The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Exploits
Severity_range_score6.4 - 9.1
Exploitability0.5
Weighted_severity8.2
Risk_score4.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-6gct-aw9u-puct