Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/83538?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83538?format=api", "vulnerability_id": "VCID-9j7e-jeqm-bkat", "summary": "JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security)", "aliases": [ { "alias": "CVE-2018-2783" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933673?format=api", "purl": "pkg:deb/debian/openjdk-8@0?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@0%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/109051?format=api", "purl": "pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.191-1jpp.1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-27zg-g9hc-4bg1" }, { "vulnerability": "VCID-6qtk-xzvb-ubfr" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-enkm-4xpy-6bfp" }, { "vulnerability": "VCID-jh9n-h2qn-pqh3" }, { "vulnerability": "VCID-k57c-bcn4-zbat" }, { "vulnerability": "VCID-nwvg-gjkx-8khw" }, { "vulnerability": "VCID-rf14-48vb-w7gh" }, { "vulnerability": "VCID-rgf4-rwp5-dqd7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.191-1jpp.1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/109052?format=api", "purl": "pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.191-1jpp.2?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-27zg-g9hc-4bg1" }, { "vulnerability": "VCID-6qtk-xzvb-ubfr" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-enkm-4xpy-6bfp" }, { "vulnerability": "VCID-jh9n-h2qn-pqh3" }, { "vulnerability": "VCID-k57c-bcn4-zbat" }, { "vulnerability": "VCID-nwvg-gjkx-8khw" }, { "vulnerability": "VCID-rf14-48vb-w7gh" }, { "vulnerability": "VCID-rgf4-rwp5-dqd7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-sun@1:1.6.0.191-1jpp.2%3Farch=el6" }, { "url": "http://public2.vulnerablecode.io/api/packages/109064?format=api", "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.171-1jpp.1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2jc9-6xf6-63a6" }, { "vulnerability": "VCID-4zte-62md-kyd8" }, { "vulnerability": "VCID-5bfn-1ajw-cqdr" }, { "vulnerability": "VCID-6aph-ab51-2qbt" }, { "vulnerability": "VCID-6xzp-k5m9-ykbc" }, { "vulnerability": "VCID-8f22-4b8p-m3aa" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-db1c-8scn-buet" }, { "vulnerability": "VCID-eu23-93rk-pkaz" }, { "vulnerability": "VCID-gfk8-e7xe-17fk" }, { "vulnerability": "VCID-htzk-vgn5-m7ak" }, { "vulnerability": "VCID-kw91-zqtv-7kap" }, { "vulnerability": "VCID-r4tw-jgd7-euet" }, { "vulnerability": "VCID-uc2v-fweb-cfew" }, { "vulnerability": "VCID-w83z-5wt6-j3fz" }, { "vulnerability": "VCID-xqrm-1bu9-abfe" }, { "vulnerability": "VCID-y34y-ewv6-fkhb" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.171-1jpp.1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/109066?format=api", "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.171-1jpp.1?arch=el6_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2jc9-6xf6-63a6" }, { "vulnerability": "VCID-4zte-62md-kyd8" }, { "vulnerability": "VCID-5bfn-1ajw-cqdr" }, { "vulnerability": "VCID-6aph-ab51-2qbt" }, { "vulnerability": "VCID-6xzp-k5m9-ykbc" }, { "vulnerability": "VCID-8f22-4b8p-m3aa" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-db1c-8scn-buet" }, { "vulnerability": "VCID-eu23-93rk-pkaz" }, { "vulnerability": "VCID-gfk8-e7xe-17fk" }, { "vulnerability": "VCID-htzk-vgn5-m7ak" }, { "vulnerability": "VCID-kw91-zqtv-7kap" }, { "vulnerability": "VCID-r4tw-jgd7-euet" }, { "vulnerability": "VCID-uc2v-fweb-cfew" }, { "vulnerability": "VCID-w83z-5wt6-j3fz" }, { "vulnerability": "VCID-xqrm-1bu9-abfe" }, { "vulnerability": "VCID-y34y-ewv6-fkhb" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.171-1jpp.1%3Farch=el6_9" }, { "url": "http://public2.vulnerablecode.io/api/packages/109059?format=api", "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.25-1jpp.2?arch=el6_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-27zg-g9hc-4bg1" }, { "vulnerability": "VCID-6qtk-xzvb-ubfr" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-gceb-nxww-w3f5" }, { "vulnerability": "VCID-jh9n-h2qn-pqh3" }, { "vulnerability": "VCID-k57c-bcn4-zbat" }, { "vulnerability": "VCID-nwvg-gjkx-8khw" }, { "vulnerability": "VCID-rf14-48vb-w7gh" }, { "vulnerability": "VCID-z4et-kgqx-qkgy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.25-1jpp.2%3Farch=el6_9" }, { "url": "http://public2.vulnerablecode.io/api/packages/109055?format=api", "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.25-1jpp.3?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-27zg-g9hc-4bg1" }, { "vulnerability": "VCID-6qtk-xzvb-ubfr" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-gceb-nxww-w3f5" }, { "vulnerability": "VCID-jh9n-h2qn-pqh3" }, { "vulnerability": "VCID-k57c-bcn4-zbat" }, { "vulnerability": "VCID-nwvg-gjkx-8khw" }, { "vulnerability": "VCID-rf14-48vb-w7gh" }, { "vulnerability": "VCID-z4et-kgqx-qkgy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.25-1jpp.3%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/109056?format=api", "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.25-1jpp.3?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-27zg-g9hc-4bg1" }, { "vulnerability": "VCID-6qtk-xzvb-ubfr" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-gceb-nxww-w3f5" }, { "vulnerability": "VCID-jh9n-h2qn-pqh3" }, { "vulnerability": "VCID-k57c-bcn4-zbat" }, { "vulnerability": "VCID-nwvg-gjkx-8khw" }, { "vulnerability": "VCID-rf14-48vb-w7gh" }, { "vulnerability": "VCID-z4et-kgqx-qkgy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.25-1jpp.3%3Farch=el6" }, { "url": "http://public2.vulnerablecode.io/api/packages/109054?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.15-1jpp.2?arch=el6_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-27zg-g9hc-4bg1" }, { "vulnerability": "VCID-6qtk-xzvb-ubfr" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-gceb-nxww-w3f5" }, { "vulnerability": "VCID-jh9n-h2qn-pqh3" }, { "vulnerability": "VCID-k57c-bcn4-zbat" }, { "vulnerability": "VCID-nwvg-gjkx-8khw" }, { "vulnerability": "VCID-rf14-48vb-w7gh" }, { "vulnerability": "VCID-z4et-kgqx-qkgy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.15-1jpp.2%3Farch=el6_9" }, { "url": "http://public2.vulnerablecode.io/api/packages/109057?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.15-1jpp.2?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-27zg-g9hc-4bg1" }, { "vulnerability": "VCID-6qtk-xzvb-ubfr" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-gceb-nxww-w3f5" }, { "vulnerability": "VCID-jh9n-h2qn-pqh3" }, { "vulnerability": "VCID-k57c-bcn4-zbat" }, { "vulnerability": "VCID-nwvg-gjkx-8khw" }, { "vulnerability": "VCID-rf14-48vb-w7gh" }, { "vulnerability": "VCID-z4et-kgqx-qkgy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.15-1jpp.2%3Farch=el6" }, { "url": "http://public2.vulnerablecode.io/api/packages/109058?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.15-1jpp.5?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-27zg-g9hc-4bg1" }, { "vulnerability": "VCID-6qtk-xzvb-ubfr" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-gceb-nxww-w3f5" }, { "vulnerability": "VCID-jh9n-h2qn-pqh3" }, { "vulnerability": "VCID-k57c-bcn4-zbat" }, { "vulnerability": "VCID-nwvg-gjkx-8khw" }, { "vulnerability": "VCID-rf14-48vb-w7gh" }, { "vulnerability": "VCID-z4et-kgqx-qkgy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.15-1jpp.5%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/109065?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.161-1jpp.1?arch=el6_9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2jc9-6xf6-63a6" }, { "vulnerability": "VCID-4zte-62md-kyd8" }, { "vulnerability": "VCID-5bfn-1ajw-cqdr" }, { "vulnerability": "VCID-6aph-ab51-2qbt" }, { "vulnerability": "VCID-6xzp-k5m9-ykbc" }, { "vulnerability": "VCID-8f22-4b8p-m3aa" }, { "vulnerability": "VCID-8x6f-shrr-sqaj" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-azey-nwkx-ukat" }, { "vulnerability": "VCID-c1mn-fexd-p3dk" }, { "vulnerability": "VCID-db1c-8scn-buet" }, { "vulnerability": "VCID-gfk8-e7xe-17fk" }, { "vulnerability": "VCID-htzk-vgn5-m7ak" }, { "vulnerability": "VCID-jnkf-c6qq-77c2" }, { "vulnerability": "VCID-kw91-zqtv-7kap" }, { "vulnerability": "VCID-r4tw-jgd7-euet" }, { "vulnerability": "VCID-uc2v-fweb-cfew" }, { "vulnerability": "VCID-w83z-5wt6-j3fz" }, { "vulnerability": "VCID-xqrm-1bu9-abfe" }, { "vulnerability": "VCID-y34y-ewv6-fkhb" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.161-1jpp.1%3Farch=el6_9" }, { "url": "http://public2.vulnerablecode.io/api/packages/109063?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.161-1jpp.2?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2jc9-6xf6-63a6" }, { "vulnerability": "VCID-4zte-62md-kyd8" }, { "vulnerability": "VCID-5bfn-1ajw-cqdr" }, { "vulnerability": "VCID-6aph-ab51-2qbt" }, { "vulnerability": "VCID-6xzp-k5m9-ykbc" }, { "vulnerability": "VCID-8f22-4b8p-m3aa" }, { "vulnerability": "VCID-8x6f-shrr-sqaj" }, { "vulnerability": "VCID-9j7e-jeqm-bkat" }, { "vulnerability": "VCID-azey-nwkx-ukat" }, { "vulnerability": "VCID-c1mn-fexd-p3dk" }, { "vulnerability": "VCID-db1c-8scn-buet" }, { "vulnerability": "VCID-gfk8-e7xe-17fk" }, { "vulnerability": "VCID-htzk-vgn5-m7ak" }, { "vulnerability": "VCID-jnkf-c6qq-77c2" }, { "vulnerability": "VCID-kw91-zqtv-7kap" }, { "vulnerability": "VCID-r4tw-jgd7-euet" }, { "vulnerability": "VCID-uc2v-fweb-cfew" }, { "vulnerability": "VCID-w83z-5wt6-j3fz" }, { "vulnerability": "VCID-xqrm-1bu9-abfe" }, { "vulnerability": "VCID-y34y-ewv6-fkhb" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.161-1jpp.2%3Farch=el7" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2783.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2783.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2783", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59231", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59267", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65687", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65608", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65673", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65637", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65655", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65667", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65559", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2783" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20180419-0001/" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "reference_url": "http://www.securityfocus.com/bid/103832", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "http://www.securityfocus.com/bid/103832" }, { "reference_url": "http://www.securitytracker.com/id/1040697", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "http://www.securitytracker.com/id/1040697" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569204", "reference_id": "1569204", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569204" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*", "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update161:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update152:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update161:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update152:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2783", "reference_id": "CVE-2018-2783", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099", "reference_id": "RHSA-2018:0099", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100", "reference_id": "RHSA-2018:0100", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0100" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203", "reference_id": "RHSA-2018:1203", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205", "reference_id": "RHSA-2018:1205", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721", "reference_id": "RHSA-2018:1721", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:1721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722", "reference_id": "RHSA-2018:1722", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:1722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723", "reference_id": "RHSA-2018:1723", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:1723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724", "reference_id": "RHSA-2018:1724", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:1724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974", "reference_id": "RHSA-2018:1974", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:1974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975", "reference_id": "RHSA-2018:1975", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:1975" }, { "reference_url": "https://usn.ubuntu.com/3644-1/", "reference_id": "USN-3644-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:39Z/" } ], "url": "https://usn.ubuntu.com/3644-1/" } ], "weaknesses": [], "exploits": [], "severity_range_score": "5.8 - 7.4", "exploitability": "0.5", "weighted_severity": "6.7", "risk_score": 3.4, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9j7e-jeqm-bkat" }