{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79894?format=json","vulnerability_id":"VCID-ntw3-4q71-u7hr","summary":"JDK: IllegalAccessError exception not thrown for MethodHandles that invoke inaccessible interface methods","aliases":[{"alias":"CVE-2021-41035"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/99792?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.5.0-1jpp.1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-ntw3-4q71-u7hr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.5.0-1jpp.1%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/99793?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.0-1?arch=el8_5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cfu-xjj6-tfcw"},{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-ntw3-4q71-u7hr"},{"vulnerability":"VCID-yxk8-59zb-y7g2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.0-1%3Farch=el8_5"},{"url":"http://public2.vulnerablecode.io/api/packages/99794?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.0-1jpp.1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cfu-xjj6-tfcw"},{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-ntw3-4q71-u7hr"},{"vulnerability":"VCID-yxk8-59zb-y7g2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.0-1jpp.1%3Farch=el7"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41035.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41035.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-41035","reference_id":"","reference_type":"","scores":[{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35062","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3529","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35172","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35245","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3521","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35225","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35211","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35163","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3491","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3482","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35798","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.3575","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35817","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35819","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35728","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-41035"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027791","reference_id":"2027791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2027791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5030","reference_id":"RHSA-2021:5030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0310","reference_id":"RHSA-2022:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0345","reference_id":"RHSA-2022:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0345"}],"weaknesses":[{"cwe_id":732,"name":"Incorrect Permission Assignment for Critical Resource","description":"The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors."}],"exploits":[],"severity_range_score":"2.9 - 5.3","exploitability":"0.5","weighted_severity":"4.8","risk_score":2.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ntw3-4q71-u7hr"}