Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.apache.nifi/nifi-web-security@1.3.0 |
| Type | maven |
| Namespace | org.apache.nifi |
| Name | nifi-web-security |
| Version | 1.3.0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 1.12.0 |
| Latest_non_vulnerable_version | 1.12.0 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-cg2v-phw4-ake2 |
| vulnerability_id |
VCID-cg2v-phw4-ake2 |
| summary |
Missing Authentication for Critical Function in Apache NiFi
In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimate users from requesting download tokens. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9487 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70384 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70341 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70356 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70379 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70364 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70351 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70394 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70403 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70288 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70301 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70318 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70296 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9487 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-9487, GHSA-3pp3-77j6-8ph6
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cg2v-phw4-ake2 |
|
| 1 |
| url |
VCID-mrb8-sr51-vkep |
| vulnerability_id |
VCID-mrb8-sr51-vkep |
| summary |
Apache NiFi user log out issue
When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68275 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68266 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68286 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68196 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68214 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68191 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68242 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68257 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68282 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68269 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68235 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68174 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12421 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-12421, GHSA-fmqw-vqh5-cwq9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mrb8-sr51-vkep |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi-web-security@1.3.0 |