Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/83283?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83283?format=api", "vulnerability_id": "VCID-jvtu-gg6n-hyce", "summary": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)", "aliases": [ { "alias": "CVE-2018-2941" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933726?format=api", "purl": "pkg:deb/debian/openjfx@11%2B26-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11%252B26-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050271?format=api", "purl": "pkg:deb/debian/openjfx@11.0.2%2B1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/933721?format=api", "purl": "pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/933719?format=api", "purl": "pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/933722?format=api", "purl": "pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037460?format=api", "purl": "pkg:deb/debian/openjfx@8u102-b14-1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-26wp-rmjk-huc8" }, { "vulnerability": "VCID-2znn-4qpa-6kbm" }, { "vulnerability": "VCID-4m47-kkyx-dyet" }, { "vulnerability": "VCID-5bfn-1ajw-cqdr" }, { "vulnerability": "VCID-a91k-9kv3-yfb9" }, { "vulnerability": "VCID-jvtu-gg6n-hyce" }, { "vulnerability": "VCID-jw3n-w9gu-x3hg" }, { "vulnerability": "VCID-ts2n-qwjz-nfec" }, { "vulnerability": "VCID-yptm-3aag-fqbj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u102-b14-1~bpo8%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037461?format=api", "purl": "pkg:deb/debian/openjfx@8u111-b14-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2znn-4qpa-6kbm" }, { "vulnerability": "VCID-4m47-kkyx-dyet" }, { "vulnerability": "VCID-5bfn-1ajw-cqdr" }, { "vulnerability": "VCID-a91k-9kv3-yfb9" }, { "vulnerability": "VCID-jvtu-gg6n-hyce" }, { "vulnerability": "VCID-jw3n-w9gu-x3hg" }, { "vulnerability": "VCID-ts2n-qwjz-nfec" }, { "vulnerability": "VCID-yptm-3aag-fqbj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u111-b14-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037462?format=api", "purl": "pkg:deb/debian/openjfx@8u141-b14-3~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2znn-4qpa-6kbm" }, { "vulnerability": "VCID-5bfn-1ajw-cqdr" }, { "vulnerability": "VCID-a91k-9kv3-yfb9" }, { "vulnerability": "VCID-jvtu-gg6n-hyce" }, { "vulnerability": "VCID-jw3n-w9gu-x3hg" }, { "vulnerability": "VCID-yptm-3aag-fqbj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u141-b14-3~deb9u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/108201?format=api", "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.191-1jpp.1?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3jv7-ceaz-87cb" }, { "vulnerability": "VCID-8gea-2k69-cbdk" }, { "vulnerability": "VCID-jvtu-gg6n-hyce" }, { "vulnerability": "VCID-mf9y-bpcs-f3df" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.191-1jpp.1%3Farch=el6" }, { "url": "http://public2.vulnerablecode.io/api/packages/108204?format=api", "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.191-1jpp.2?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3jv7-ceaz-87cb" }, { "vulnerability": "VCID-8gea-2k69-cbdk" }, { "vulnerability": "VCID-jvtu-gg6n-hyce" }, { "vulnerability": "VCID-mf9y-bpcs-f3df" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.191-1jpp.2%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108203?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.181-1jpp.2?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3jv7-ceaz-87cb" }, { "vulnerability": "VCID-8gea-2k69-cbdk" }, { "vulnerability": "VCID-dab9-tg36-93e3" }, { "vulnerability": "VCID-jvtu-gg6n-hyce" }, { "vulnerability": "VCID-mf9y-bpcs-f3df" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.181-1jpp.2%3Farch=el6" }, { "url": "http://public2.vulnerablecode.io/api/packages/108205?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.181-1jpp.2?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3jv7-ceaz-87cb" }, { "vulnerability": "VCID-8gea-2k69-cbdk" }, { "vulnerability": "VCID-dab9-tg36-93e3" }, { "vulnerability": "VCID-jvtu-gg6n-hyce" }, { "vulnerability": "VCID-mf9y-bpcs-f3df" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.181-1jpp.2%3Farch=el7" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2941", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.79571", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.79538", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.79546", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.79568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.79551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.79543", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.79572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.795", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.79494", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.79524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01275", "scoring_system": "epss", "scoring_elements": "0.7951", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20180726-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20180726-0001/" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "reference_url": "http://www.securityfocus.com/bid/104775", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/" } ], "url": "http://www.securityfocus.com/bid/104775" }, { "reference_url": "http://www.securitytracker.com/id/1041302", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/" } ], "url": "http://www.securitytracker.com/id/1041302" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143", "reference_id": "1602143", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215", "reference_id": "905215", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941", "reference_id": "CVE-2018-2941", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2253", "reference_id": "RHSA-2018:2253", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2254", "reference_id": "RHSA-2018:2254", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2254" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2255", "reference_id": "RHSA-2018:2255", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2256", "reference_id": "RHSA-2018:2256", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2256" } ], "weaknesses": [], "exploits": [], "severity_range_score": "5.1 - 8.3", "exploitability": "0.5", "weighted_severity": "7.5", "risk_score": 3.8, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtu-gg6n-hyce" }