Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/83502?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83502?format=api", "vulnerability_id": "VCID-4pf5-6u2a-37gu", "summary": "source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go", "aliases": [ { "alias": "CVE-2018-1102" } ], "fixed_packages": [], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/108870?format=api", "purl": "pkg:rpm/redhat/apb@1.0.6-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/apb@1.0.6-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108878?format=api", "purl": "pkg:rpm/redhat/atomic-openshift@3.1.1.11-4.git.3.12809c8?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.1.1.11-4.git.3.12809c8%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108882?format=api", "purl": "pkg:rpm/redhat/atomic-openshift@3.2.1.34-2.git.3.aad33c3?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.2.1.34-2.git.3.aad33c3%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108857?format=api", "purl": "pkg:rpm/redhat/atomic-openshift@3.3.1.46.39-2.git.3.cc57f5b?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.3.1.46.39-2.git.3.cc57f5b%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108862?format=api", "purl": "pkg:rpm/redhat/atomic-openshift@3.4.1.44.53-1.git.0.d7eb028?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.4.1.44.53-1.git.0.d7eb028%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108860?format=api", "purl": "pkg:rpm/redhat/atomic-openshift@3.5.5.31.67-1.git.0.0a8cf24?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.5.5.31.67-1.git.0.0a8cf24%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108875?format=api", "purl": "pkg:rpm/redhat/atomic-openshift@3.6.173.0.113-1.git.0.65fb9fb?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.6.173.0.113-1.git.0.65fb9fb%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108861?format=api", "purl": "pkg:rpm/redhat/atomic-openshift@3.7.44-1.git.0.6b061d4?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.7.44-1.git.0.6b061d4%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108874?format=api", "purl": "pkg:rpm/redhat/atomic-openshift@3.8.37-1.git.0.e85a326?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.8.37-1.git.0.e85a326%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108872?format=api", "purl": "pkg:rpm/redhat/atomic-openshift@3.9.25-1.git.0.6bc473e?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift@3.9.25-1.git.0.6bc473e%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108876?format=api", "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.8.37-1.git.224.8e15ecf?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-openshift-dockerregistry@3.8.37-1.git.224.8e15ecf%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108864?format=api", "purl": "pkg:rpm/redhat/openshift-ansible@3.4.168-1.git.0.bb73aad?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-ansible@3.4.168-1.git.0.bb73aad%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108883?format=api", "purl": "pkg:rpm/redhat/openshift-ansible@3.5.165-1.git.0.475fa67?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-ansible@3.5.165-1.git.0.475fa67%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108871?format=api", "purl": "pkg:rpm/redhat/openshift-ansible@3.8.37-1.git.0.be319af?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-ansible@3.8.37-1.git.0.be319af%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108877?format=api", "purl": "pkg:rpm/redhat/python-ruamel-yaml@0.12.14-9?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-ruamel-yaml@0.12.14-9%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108873?format=api", "purl": "pkg:rpm/redhat/rubygem-cool.io@1.5.3-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-u9ph-5sbd-mfgp" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-cool.io@1.5.3-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108866?format=api", "purl": "pkg:rpm/redhat/rubygem-excon@0.60.0-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-excon@0.60.0-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108865?format=api", "purl": "pkg:rpm/redhat/rubygem-faraday@0.13.1-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-faraday@0.13.1-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108879?format=api", "purl": "pkg:rpm/redhat/rubygem-ffi@1.9.23-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-u9ph-5sbd-mfgp" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-ffi@1.9.23-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108884?format=api", "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-elasticsearch@1.14.0-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-fluent-plugin-elasticsearch@1.14.0-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108868?format=api", "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-kubernetes_metadata_filter@1.0.1-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-fluent-plugin-kubernetes_metadata_filter@1.0.1-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108880?format=api", "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-systemd@0.0.9-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-fluent-plugin-systemd@0.0.9-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108886?format=api", "purl": "pkg:rpm/redhat/rubygem-minitest@5.10.3-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-u9ph-5sbd-mfgp" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-minitest@5.10.3-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108881?format=api", "purl": "pkg:rpm/redhat/rubygem-msgpack@1.2.2-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-msgpack@1.2.2-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108863?format=api", "purl": "pkg:rpm/redhat/rubygem-multi_json@1.13.1-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-u9ph-5sbd-mfgp" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-multi_json@1.13.1-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108859?format=api", "purl": "pkg:rpm/redhat/rubygem-systemd-journal@1.3.1-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-systemd-journal@1.3.1-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108867?format=api", "purl": "pkg:rpm/redhat/rubygem-tzinfo@1.2.5-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-u9ph-5sbd-mfgp" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-tzinfo@1.2.5-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108869?format=api", "purl": "pkg:rpm/redhat/rubygem-tzinfo-data@1.2018.3-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-tzinfo-data@1.2018.3-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108885?format=api", "purl": "pkg:rpm/redhat/rubygem-unf_ext@0.0.7.5-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" }, { "vulnerability": "VCID-ep8y-hq9y-afcu" }, { "vulnerability": "VCID-u9ph-5sbd-mfgp" }, { "vulnerability": "VCID-vtvy-ec7a-xua9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-unf_ext@0.0.7.5-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/108858?format=api", "purl": "pkg:rpm/redhat/source-to-image@1.1.13-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4pf5-6u2a-37gu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/source-to-image@1.1.13-1%3Farch=el7" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1102.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1102.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1102", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.8136", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81611", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81555", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81573", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81392", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.8139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81418", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81424", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81445", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81433", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81426", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81463", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81465", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81486", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81493", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81498", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81517", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81536", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01553", "scoring_system": "epss", "scoring_elements": "0.81558", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1102" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562246", "reference_id": "1562246", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562246" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.3:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.3:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.3:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.4:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.4:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.5:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.5:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.6:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.6:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.7:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.7:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.8:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.8:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.8:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.9:*:*:*:enterprise:*:*:*", "reference_id": "cpe:2.3:a:redhat:openshift:3.9:*:*:*:enterprise:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.9:*:*:*:enterprise:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1102", "reference_id": "CVE-2018-1102", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1227", "reference_id": "RHSA-2018:1227", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1227" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1229", "reference_id": "RHSA-2018:1229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1231", "reference_id": "RHSA-2018:1231", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1231" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1233", "reference_id": "RHSA-2018:1233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1235", "reference_id": "RHSA-2018:1235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1237", "reference_id": "RHSA-2018:1237", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1239", "reference_id": "RHSA-2018:1239", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1239" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1241", "reference_id": "RHSA-2018:1241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1243", "reference_id": "RHSA-2018:1243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0036", "reference_id": "RHSA-2019:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0036" } ], "weaknesses": [ { "cwe_id": 20, "name": "Improper Input Validation", "description": "The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly." }, { "cwe_id": 22, "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "description": "The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory." } ], "exploits": [], "severity_range_score": "6.5 - 9.9", "exploitability": "0.5", "weighted_severity": "8.9", "risk_score": 4.5, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4pf5-6u2a-37gu" }