{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78469?format=json","vulnerability_id":"VCID-7uk7-7qpn-jqaq","summary":"JDK: exposure of sensitive information using a combination of flaws and configurations","aliases":[{"alias":"CVE-2023-30441"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/96200?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1?arch=el8_6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7uk7-7qpn-jqaq"},{"vulnerability":"VCID-u9xe-x4f1-9fc8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1%3Farch=el8_6"},{"url":"http://public2.vulnerablecode.io/api/packages/96199?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1jpp.1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7uk7-7qpn-jqaq"},{"vulnerability":"VCID-u9xe-x4f1-9fc8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.15-1jpp.1%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30441.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-30441","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1511","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15219","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15155","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15078","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15171","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15114","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14984","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15345","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15148","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15236","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15287","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-30441"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188465","reference_id":"2188465","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188465"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/253188","reference_id":"253188","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/"}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/253188"},{"reference_url":"https://www.ibm.com/support/pages/node/6985011","reference_id":"6985011","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/"}],"url":"https://www.ibm.com/support/pages/node/6985011"},{"reference_url":"https://www.ibm.com/support/pages/node/6986617","reference_id":"6986617","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/"}],"url":"https://www.ibm.com/support/pages/node/6986617"},{"reference_url":"https://www.ibm.com/support/pages/node/6986637","reference_id":"6986637","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/"}],"url":"https://www.ibm.com/support/pages/node/6986637"},{"reference_url":"https://www.ibm.com/support/pages/node/6987167","reference_id":"6987167","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T17:01:16Z/"}],"url":"https://www.ibm.com/support/pages/node/6987167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6735","reference_id":"RHSA-2022:6735","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6735"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6756","reference_id":"RHSA-2022:6756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6756"}],"weaknesses":[{"cwe_id":200,"name":"Exposure of Sensitive Information to an Unauthorized Actor","description":"The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information."},{"cwe_id":327,"name":"Use of a Broken or Risky Cryptographic Algorithm","description":"The product uses a broken or risky cryptographic algorithm or protocol."}],"exploits":[],"severity_range_score":"7.5 - 7.5","exploitability":"0.5","weighted_severity":"6.8","risk_score":3.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7uk7-7qpn-jqaq"}