Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/83502?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83502?format=api",
    "vulnerability_id": "VCID-4pf5-6u2a-37gu",
    "summary": "source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go",
    "aliases": [
        {
            "alias": "CVE-2018-1102"
        }
    ],
    "fixed_packages": [],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108870?format=api",
            "purl": "pkg:rpm/redhat/apb@1.0.6-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apb@1.0.6-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108878?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift@3.1.1.11-4.git.3.12809c8?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.1.1.11-4.git.3.12809c8%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108882?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift@3.2.1.34-2.git.3.aad33c3?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.2.1.34-2.git.3.aad33c3%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108857?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift@3.3.1.46.39-2.git.3.cc57f5b?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.3.1.46.39-2.git.3.cc57f5b%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108862?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift@3.4.1.44.53-1.git.0.d7eb028?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.4.1.44.53-1.git.0.d7eb028%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108860?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift@3.5.5.31.67-1.git.0.0a8cf24?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.5.5.31.67-1.git.0.0a8cf24%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108875?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift@3.6.173.0.113-1.git.0.65fb9fb?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.6.173.0.113-1.git.0.65fb9fb%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108861?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift@3.7.44-1.git.0.6b061d4?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.7.44-1.git.0.6b061d4%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108874?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift@3.8.37-1.git.0.e85a326?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.8.37-1.git.0.e85a326%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108872?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift@3.9.25-1.git.0.6bc473e?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.9.25-1.git.0.6bc473e%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108876?format=api",
            "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.8.37-1.git.224.8e15ecf?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift-dockerregistry@3.8.37-1.git.224.8e15ecf%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108864?format=api",
            "purl": "pkg:rpm/redhat/openshift-ansible@3.4.168-1.git.0.bb73aad?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-ansible@3.4.168-1.git.0.bb73aad%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108883?format=api",
            "purl": "pkg:rpm/redhat/openshift-ansible@3.5.165-1.git.0.475fa67?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-ansible@3.5.165-1.git.0.475fa67%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108871?format=api",
            "purl": "pkg:rpm/redhat/openshift-ansible@3.8.37-1.git.0.be319af?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-ansible@3.8.37-1.git.0.be319af%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108877?format=api",
            "purl": "pkg:rpm/redhat/python-ruamel-yaml@0.12.14-9?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-ruamel-yaml@0.12.14-9%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108873?format=api",
            "purl": "pkg:rpm/redhat/rubygem-cool.io@1.5.3-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-u9ph-5sbd-mfgp"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-cool.io@1.5.3-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108866?format=api",
            "purl": "pkg:rpm/redhat/rubygem-excon@0.60.0-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-excon@0.60.0-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108865?format=api",
            "purl": "pkg:rpm/redhat/rubygem-faraday@0.13.1-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-faraday@0.13.1-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108879?format=api",
            "purl": "pkg:rpm/redhat/rubygem-ffi@1.9.23-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-u9ph-5sbd-mfgp"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-ffi@1.9.23-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108884?format=api",
            "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-elasticsearch@1.14.0-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-fluent-plugin-elasticsearch@1.14.0-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108868?format=api",
            "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-kubernetes_metadata_filter@1.0.1-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-fluent-plugin-kubernetes_metadata_filter@1.0.1-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108880?format=api",
            "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-systemd@0.0.9-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-fluent-plugin-systemd@0.0.9-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108886?format=api",
            "purl": "pkg:rpm/redhat/rubygem-minitest@5.10.3-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-u9ph-5sbd-mfgp"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-minitest@5.10.3-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108881?format=api",
            "purl": "pkg:rpm/redhat/rubygem-msgpack@1.2.2-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-msgpack@1.2.2-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108863?format=api",
            "purl": "pkg:rpm/redhat/rubygem-multi_json@1.13.1-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-u9ph-5sbd-mfgp"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-multi_json@1.13.1-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108859?format=api",
            "purl": "pkg:rpm/redhat/rubygem-systemd-journal@1.3.1-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-systemd-journal@1.3.1-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108867?format=api",
            "purl": "pkg:rpm/redhat/rubygem-tzinfo@1.2.5-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-u9ph-5sbd-mfgp"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-tzinfo@1.2.5-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108869?format=api",
            "purl": "pkg:rpm/redhat/rubygem-tzinfo-data@1.2018.3-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-tzinfo-data@1.2018.3-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108885?format=api",
            "purl": "pkg:rpm/redhat/rubygem-unf_ext@0.0.7.5-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                },
                {
                    "vulnerability": "VCID-ep8y-hq9y-afcu"
                },
                {
                    "vulnerability": "VCID-u9ph-5sbd-mfgp"
                },
                {
                    "vulnerability": "VCID-vtvy-ec7a-xua9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-unf_ext@0.0.7.5-1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/108858?format=api",
            "purl": "pkg:rpm/redhat/source-to-image@1.1.13-1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4pf5-6u2a-37gu"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/source-to-image@1.1.13-1%3Farch=el7"
        }
    ],
    "references": [
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1102.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "9.9",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                }
            ],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1102.json"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1102",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.8136",
                    "published_at": "2026-04-01T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81611",
                    "published_at": "2026-05-14T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81555",
                    "published_at": "2026-05-11T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81573",
                    "published_at": "2026-05-12T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81369",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81392",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.8139",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81418",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81424",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81445",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81433",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81426",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81463",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81465",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81486",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81493",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81498",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81517",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81536",
                    "published_at": "2026-05-07T12:55:00Z"
                },
                {
                    "value": "0.01553",
                    "scoring_system": "epss",
                    "scoring_elements": "0.81558",
                    "published_at": "2026-05-09T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1102"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562246",
            "reference_id": "1562246",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562246"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.3:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.3:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.3:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.4:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.5:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.6:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.7:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.8:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.8:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.8:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.9:*:*:*:enterprise:*:*:*",
            "reference_id": "cpe:2.3:a:redhat:openshift:3.9:*:*:*:enterprise:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.9:*:*:*:enterprise:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1102",
            "reference_id": "CVE-2018-1102",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv2",
                    "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
                },
                {
                    "value": "8.8",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1102"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2018:1227",
            "reference_id": "RHSA-2018:1227",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2018:1227"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2018:1229",
            "reference_id": "RHSA-2018:1229",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2018:1229"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2018:1231",
            "reference_id": "RHSA-2018:1231",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2018:1231"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2018:1233",
            "reference_id": "RHSA-2018:1233",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2018:1233"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2018:1235",
            "reference_id": "RHSA-2018:1235",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2018:1235"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2018:1237",
            "reference_id": "RHSA-2018:1237",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2018:1237"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2018:1239",
            "reference_id": "RHSA-2018:1239",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2018:1239"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2018:1241",
            "reference_id": "RHSA-2018:1241",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2018:1241"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2018:1243",
            "reference_id": "RHSA-2018:1243",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2018:1243"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2019:0036",
            "reference_id": "RHSA-2019:0036",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2019:0036"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 20,
            "name": "Improper Input Validation",
            "description": "The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."
        },
        {
            "cwe_id": 22,
            "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
            "description": "The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory."
        }
    ],
    "exploits": [],
    "severity_range_score": "6.5 - 9.9",
    "exploitability": "0.5",
    "weighted_severity": "8.9",
    "risk_score": 4.5,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4pf5-6u2a-37gu"
}