{"url":"http://public2.vulnerablecode.io/api/packages/119800?format=json","purl":"pkg:rpm/redhat/jbossas-core@7.4.3-2.Final_redhat_2.1.ep6?arch=el7","type":"rpm","namespace":"redhat","name":"jbossas-core","version":"7.4.3-2.Final_redhat_2.1.ep6","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85811?format=json","vulnerability_id":"VCID-18sk-y8hg-dfec","summary":"Subsystem: Information disclosure via incorrect sensitivity classification of attribute","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7853.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7853.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7853","reference_id":"","reference_type":"","scores":[{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62365","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62423","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.6242","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62488","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62496","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62473","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7853"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165522","reference_id":"1165522","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0215","reference_id":"RHSA-2015:0215","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0215"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0216","reference_id":"RHSA-2015:0216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0217","reference_id":"RHSA-2015:0217","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0218","reference_id":"RHSA-2015:0218","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0920","reference_id":"RHSA-2015:0920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0920"}],"fixed_packages":[],"aliases":["CVE-2014-7853"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-18sk-y8hg-dfec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4850?format=json","vulnerability_id":"VCID-1hkw-y3nn-zbea","summary":"Race condition in JBoss Weld before 2.2.8 and 3.x before 3.0.0 Alpha3 allows remote attackers to obtain information from a previous conversation via vectors related to a stale thread state.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0215.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0215.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0216.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0216.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0217.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0217.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0218.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0218.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0675.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0773.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0773.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0850.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0850.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0851.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0851.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0920.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0920.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8122.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8122.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8122","reference_id":"","reference_type":"","scores":[{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73164","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73195","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73205","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73225","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8122"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/100892","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/100892"},{"reference_url":"https://github.com/victims/victims-cve-db/blob/master/database/java/2014/8122.yaml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/victims/victims-cve-db/blob/master/database/java/2014/8122.yaml"},{"reference_url":"https://github.com/weld/core","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/weld/core"},{"reference_url":"https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745"},{"reference_url":"https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086"},{"reference_url":"https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8122","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8122"},{"reference_url":"http://www.securityfocus.com/bid/74252","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/74252"},{"reference_url":"http://www.securitytracker.com/id/1031741","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securitytracker.com/id/1031741"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169237","reference_id":"1169237","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169237"},{"reference_url":"https://bugzilla.redhat.com/CVE-2014-8122","reference_id":"CVE-2014-8122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/CVE-2014-8122"},{"reference_url":"https://github.com/advisories/GHSA-338v-3958-8v8r","reference_id":"GHSA-338v-3958-8v8r","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-338v-3958-8v8r"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0215","reference_id":"RHSA-2015:0215","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0215"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0216","reference_id":"RHSA-2015:0216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0217","reference_id":"RHSA-2015:0217","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0218","reference_id":"RHSA-2015:0218","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0675","reference_id":"RHSA-2015:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0773","reference_id":"RHSA-2015:0773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0850","reference_id":"RHSA-2015:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0851","reference_id":"RHSA-2015:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0920","reference_id":"RHSA-2015:0920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0920"}],"fixed_packages":[],"aliases":["CVE-2014-8122","GHSA-338v-3958-8v8r"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1hkw-y3nn-zbea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85808?format=json","vulnerability_id":"VCID-ejb2-gj9u-5fcn","summary":"Management: Limited RBAC authorization bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7849.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7849.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7849","reference_id":"","reference_type":"","scores":[{"value":"0.004","scoring_system":"epss","scoring_elements":"0.6057","published_at":"2026-04-01T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60645","published_at":"2026-04-02T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60643","published_at":"2026-04-07T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60691","published_at":"2026-04-08T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60731","published_at":"2026-04-11T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60698","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7849"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165170","reference_id":"1165170","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0215","reference_id":"RHSA-2015:0215","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0215"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0216","reference_id":"RHSA-2015:0216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0217","reference_id":"RHSA-2015:0217","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0218","reference_id":"RHSA-2015:0218","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0920","reference_id":"RHSA-2015:0920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0920"}],"fixed_packages":[],"aliases":["CVE-2014-7849"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ejb2-gj9u-5fcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7069?format=json","vulnerability_id":"VCID-jds7-wgvc-k7hy","summary":"Wrong security context loaded when using SAML2 STS Login Module\nThe `org.jboss.security.plugins.mapping.JBossMappingManager` implementation in this package uses the default security domain when a security domain is undefined, which allows remote authenticated users to bypass intended access restrictions by leveraging credentials on the default domain for a role that is also on the application domain.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7827.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7827","reference_id":"","reference_type":"","scores":[{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54666","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54644","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7827"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1160574","reference_id":"1160574","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1160574"},{"reference_url":"https://bugzilla.redhat.com/CVE-2014-7827","reference_id":"CVE-2014-7827","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/CVE-2014-7827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0215","reference_id":"RHSA-2015:0215","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0215"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0216","reference_id":"RHSA-2015:0216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0217","reference_id":"RHSA-2015:0217","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0218","reference_id":"RHSA-2015:0218","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0850","reference_id":"RHSA-2015:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0851","reference_id":"RHSA-2015:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0851"}],"fixed_packages":[],"aliases":["CVE-2014-7827"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jds7-wgvc-k7hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7035?format=json","vulnerability_id":"VCID-w6us-ebca-bygb","summary":"External entities expanded by DocumentProvider\n`DocumentProvider` in this package does not configure the external-general-entities or external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0675.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0773.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0773.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0850.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0850.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0851.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0851.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7839.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7839","reference_id":"","reference_type":"","scores":[{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79381","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79424","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79388","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.7941","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.7943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.7944","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79397","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7839"},{"reference_url":"http://secunia.com/advisories/62580","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62580"},{"reference_url":"https://github.com/resteasy/Resteasy","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/resteasy/Resteasy"},{"reference_url":"https://github.com/resteasy/resteasy/pull/611/commits/3ab999c899c455a0b0a00bf5e455ed3e8d9ae347","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/resteasy/resteasy/pull/611/commits/3ab999c899c455a0b0a00bf5e455ed3e8d9ae347"},{"reference_url":"https://github.com/resteasy/resteasy/pull/611/commits/8b5d8cfc963794a74636d9a840e899408ec8fdc6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/resteasy/resteasy/pull/611/commits/8b5d8cfc963794a74636d9a840e899408ec8fdc6"},{"reference_url":"https://issues.jboss.org/browse/RESTEASY-1130","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.jboss.org/browse/RESTEASY-1130"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7839","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7839"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165328","reference_id":"1165328","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165328"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770544","reference_id":"770544","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770544"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:resteasy:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:3.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:resteasy:3.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:3.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://bugzilla.redhat.com/CVE-2014-7839","reference_id":"CVE-2014-7839","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/CVE-2014-7839"},{"reference_url":"https://github.com/advisories/GHSA-pc54-pchm-xcw6","reference_id":"GHSA-pc54-pchm-xcw6","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-pc54-pchm-xcw6"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0215","reference_id":"RHSA-2015:0215","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0215"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0216","reference_id":"RHSA-2015:0216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0217","reference_id":"RHSA-2015:0217","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0218","reference_id":"RHSA-2015:0218","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0675","reference_id":"RHSA-2015:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0773","reference_id":"RHSA-2015:0773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0850","reference_id":"RHSA-2015:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0851","reference_id":"RHSA-2015:0851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1009","reference_id":"RHSA-2015:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1009"}],"fixed_packages":[],"aliases":["CVE-2014-7839","GHSA-pc54-pchm-xcw6"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w6us-ebca-bygb"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossas-core@7.4.3-2.Final_redhat_2.1.ep6%3Farch=el7"}