Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jgroups/jgroups@3.0.14.Final
Typemaven
Namespaceorg.jgroups
Namejgroups
Version3.0.14.Final
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.0.0.Final
Latest_non_vulnerable_version4.0.0.Final
Affected_by_vulnerabilities
0
url VCID-h873-uz9q-ebcr
vulnerability_id VCID-h873-uz9q-ebcr
summary It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1435.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1435.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1439.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1439.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2035.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-2035.html
3
reference_url https://access.redhat.com/errata/RHSA-2016:1345
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1345
4
reference_url https://access.redhat.com/errata/RHSA-2016:1346
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1346
5
reference_url https://access.redhat.com/errata/RHSA-2016:1347
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1347
6
reference_url https://access.redhat.com/errata/RHSA-2016:1374
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1374
7
reference_url https://access.redhat.com/errata/RHSA-2016:1376
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1376
8
reference_url https://access.redhat.com/errata/RHSA-2016:1389
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1389
9
reference_url https://access.redhat.com/errata/RHSA-2016:1432
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1432
10
reference_url https://access.redhat.com/errata/RHSA-2016:1433
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1433
11
reference_url https://access.redhat.com/errata/RHSA-2016:1434
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:1434
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2141.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2141.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2141
reference_id
reference_type
scores
0
value 0.02357
scoring_system epss
scoring_elements 0.84841
published_at 2026-04-01T12:55:00Z
1
value 0.02357
scoring_system epss
scoring_elements 0.84925
published_at 2026-04-11T12:55:00Z
2
value 0.02357
scoring_system epss
scoring_elements 0.84923
published_at 2026-04-12T12:55:00Z
3
value 0.02357
scoring_system epss
scoring_elements 0.84917
published_at 2026-04-13T12:55:00Z
4
value 0.02357
scoring_system epss
scoring_elements 0.84856
published_at 2026-04-02T12:55:00Z
5
value 0.02357
scoring_system epss
scoring_elements 0.84875
published_at 2026-04-04T12:55:00Z
6
value 0.02357
scoring_system epss
scoring_elements 0.84876
published_at 2026-04-07T12:55:00Z
7
value 0.02357
scoring_system epss
scoring_elements 0.84899
published_at 2026-04-08T12:55:00Z
8
value 0.02357
scoring_system epss
scoring_elements 0.84907
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2141
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1313589
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1313589
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2141
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://github.com/belaban/JGroups
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/belaban/JGroups
18
reference_url https://github.com/belaban/JGroups/commit/38a882331035ffed205d15a5c92b471fd09659c
reference_id
reference_type
scores
url https://github.com/belaban/JGroups/commit/38a882331035ffed205d15a5c92b471fd09659c
19
reference_url https://github.com/belaban/JGroups/commit/c3ad22234ef84d06d04d908b3c94c0d11df8afd
reference_id
reference_type
scores
url https://github.com/belaban/JGroups/commit/c3ad22234ef84d06d04d908b3c94c0d11df8afd
20
reference_url https://github.com/belaban/JGroups/commit/eeaf5241cce464ef21a2dfc4938729ade9ebef36
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/belaban/JGroups/commit/eeaf5241cce464ef21a2dfc4938729ade9ebef36
21
reference_url https://github.com/belaban/JGroups/commit/fba182c14075789e1d2c976d50d9018c671ad0b
reference_id
reference_type
scores
url https://github.com/belaban/JGroups/commit/fba182c14075789e1d2c976d50d9018c671ad0b
22
reference_url https://issues.jboss.org/browse/JGRP-2021
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://issues.jboss.org/browse/JGRP-2021
23
reference_url https://issues.redhat.com/browse/JGRP-2055
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/JGRP-2055
24
reference_url https://issues.redhat.com/browse/JGRP-2074
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/JGRP-2074
25
reference_url https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a@%3Cdev.geode.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a@%3Cdev.geode.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a%40%3Cdev.geode.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra18cac97416abc2958db0b107877c31da28d884fa6e70fd89c87384a%40%3Cdev.geode.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0@%3Cdev.geode.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0@%3Cdev.geode.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0%40%3Cdev.geode.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb37cc937d4fc026fb56de4b4ec0d054aa4083c1a4edd0d8360c068a0%40%3Cdev.geode.apache.org%3E
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2141
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-2141
30
reference_url https://rhn.redhat.com/errata/RHSA-2016-1328.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1328.html
31
reference_url https://rhn.redhat.com/errata/RHSA-2016-1329.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1329.html
32
reference_url https://rhn.redhat.com/errata/RHSA-2016-1330.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1330.html
33
reference_url https://rhn.redhat.com/errata/RHSA-2016-1331.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1331.html
34
reference_url https://rhn.redhat.com/errata/RHSA-2016-1332.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1332.html
35
reference_url https://rhn.redhat.com/errata/RHSA-2016-1333.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1333.html
36
reference_url https://rhn.redhat.com/errata/RHSA-2016-1334.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-1334.html
37
reference_url https://web.archive.org/web/20161013163606/http://www.securityfocus.com/bid/91481
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20161013163606/http://www.securityfocus.com/bid/91481
38
reference_url https://web.archive.org/web/20201207092245/http://www.securitytracker.com/id/1036165
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201207092245/http://www.securitytracker.com/id/1036165
39
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
40
reference_url http://www.securityfocus.com/bid/91481
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91481
41
reference_url http://www.securitytracker.com/id/1036165
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036165
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867493
reference_id 867493
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867493
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jgroups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jgroups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jgroups:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
50
reference_url https://github.com/advisories/GHSA-rc7h-x6cq-988q
reference_id GHSA-rc7h-x6cq-988q
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rc7h-x6cq-988q
51
reference_url https://access.redhat.com/errata/RHSA-2016:1328
reference_id RHSA-2016:1328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1328
52
reference_url https://access.redhat.com/errata/RHSA-2016:1329
reference_id RHSA-2016:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1329
53
reference_url https://access.redhat.com/errata/RHSA-2016:1330
reference_id RHSA-2016:1330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1330
54
reference_url https://access.redhat.com/errata/RHSA-2016:1331
reference_id RHSA-2016:1331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1331
55
reference_url https://access.redhat.com/errata/RHSA-2016:1332
reference_id RHSA-2016:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1332
56
reference_url https://access.redhat.com/errata/RHSA-2016:1333
reference_id RHSA-2016:1333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1333
57
reference_url https://access.redhat.com/errata/RHSA-2016:1334
reference_id RHSA-2016:1334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1334
58
reference_url https://access.redhat.com/errata/RHSA-2016:1435
reference_id RHSA-2016:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1435
59
reference_url https://access.redhat.com/errata/RHSA-2016:1439
reference_id RHSA-2016:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1439
60
reference_url https://access.redhat.com/errata/RHSA-2016:2035
reference_id RHSA-2016:2035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2035
fixed_packages
0
url pkg:maven/org.jgroups/jgroups@3.2.16.Final
purl pkg:maven/org.jgroups/jgroups@3.2.16.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h873-uz9q-ebcr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@3.2.16.Final
1
url pkg:maven/org.jgroups/jgroups@3.6.10.Final
purl pkg:maven/org.jgroups/jgroups@3.6.10.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h873-uz9q-ebcr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@3.6.10.Final
2
url pkg:maven/org.jgroups/jgroups@4.0
purl pkg:maven/org.jgroups/jgroups@4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@4.0
3
url pkg:maven/org.jgroups/jgroups@4.0.0.Final
purl pkg:maven/org.jgroups/jgroups@4.0.0.Final
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@4.0.0.Final
aliases CVE-2016-2141, GHSA-rc7h-x6cq-988q
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h873-uz9q-ebcr
1
url VCID-vsfy-3jf4-aqg7
vulnerability_id VCID-vsfy-3jf4-aqg7
summary
Authentication via cached credentials
The `DiagnosticsHandler` in this package allows remote attackers to obtain sensitive information (diagnostic information) and execute arbitrary code by reusing valid credentials.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-1207.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1207.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-1208.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1208.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1209.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1209.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-1437.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1437.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1771.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1771.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2014-0029.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0029.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4112.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4112.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4112
reference_id
reference_type
scores
0
value 0.00622
scoring_system epss
scoring_elements 0.70088
published_at 2026-04-13T12:55:00Z
1
value 0.00622
scoring_system epss
scoring_elements 0.70093
published_at 2026-04-09T12:55:00Z
2
value 0.00622
scoring_system epss
scoring_elements 0.70116
published_at 2026-04-11T12:55:00Z
3
value 0.00622
scoring_system epss
scoring_elements 0.70101
published_at 2026-04-12T12:55:00Z
4
value 0.00622
scoring_system epss
scoring_elements 0.70025
published_at 2026-04-01T12:55:00Z
5
value 0.00622
scoring_system epss
scoring_elements 0.70037
published_at 2026-04-02T12:55:00Z
6
value 0.00622
scoring_system epss
scoring_elements 0.70052
published_at 2026-04-04T12:55:00Z
7
value 0.00622
scoring_system epss
scoring_elements 0.70029
published_at 2026-04-07T12:55:00Z
8
value 0.00622
scoring_system epss
scoring_elements 0.70077
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4112
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=983489
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=983489
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4112
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4112
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4112
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717031
reference_id 717031
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717031
12
reference_url https://bugzilla.redhat.com/CVE-2013-4112
reference_id CVE-2013-4112
reference_type
scores
url https://bugzilla.redhat.com/CVE-2013-4112
13
reference_url https://github.com/advisories/GHSA-cc62-496p-hrr7
reference_id GHSA-cc62-496p-hrr7
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cc62-496p-hrr7
14
reference_url https://access.redhat.com/errata/RHSA-2013:1207
reference_id RHSA-2013:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1207
15
reference_url https://access.redhat.com/errata/RHSA-2013:1208
reference_id RHSA-2013:1208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1208
16
reference_url https://access.redhat.com/errata/RHSA-2013:1209
reference_id RHSA-2013:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1209
17
reference_url https://access.redhat.com/errata/RHSA-2013:1437
reference_id RHSA-2013:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1437
18
reference_url https://access.redhat.com/errata/RHSA-2013:1771
reference_id RHSA-2013:1771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1771
19
reference_url https://access.redhat.com/errata/RHSA-2014:0029
reference_id RHSA-2014:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0029
fixed_packages
0
url pkg:maven/org.jgroups/jgroups@3.1.0.Alpha1
purl pkg:maven/org.jgroups/jgroups@3.1.0.Alpha1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h873-uz9q-ebcr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@3.1.0.Alpha1
1
url pkg:maven/org.jgroups/jgroups@3.2.9.Final
purl pkg:maven/org.jgroups/jgroups@3.2.9.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h873-uz9q-ebcr
1
vulnerability VCID-vsfy-3jf4-aqg7
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@3.2.9.Final
2
url pkg:maven/org.jgroups/jgroups@3.2.10.Final
purl pkg:maven/org.jgroups/jgroups@3.2.10.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h873-uz9q-ebcr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@3.2.10.Final
3
url pkg:maven/org.jgroups/jgroups@3.3.3.Final
purl pkg:maven/org.jgroups/jgroups@3.3.3.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h873-uz9q-ebcr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@3.3.3.Final
aliases CVE-2013-4112, GHSA-cc62-496p-hrr7
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsfy-3jf4-aqg7
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jgroups/jgroups@3.0.14.Final