Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.5.0 |
| Type | maven |
| Namespace | org.apache.nifi.registry |
| Name | nifi-registry-web-api |
| Version | 0.5.0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 1.16.3 |
| Latest_non_vulnerable_version | 1.16.3 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-6xux-6rk7-gygr |
| vulnerability_id |
VCID-6xux-6rk7-gygr |
| summary |
Insufficient Session Expiration
If NiFi Registry to uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to hours after logging out to make API requests to NiFi Registry. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9482 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.76012 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75928 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75931 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75964 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75942 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.7599 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.76015 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75991 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.75985 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.76025 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00923 |
| scoring_system |
epss |
| scoring_elements |
0.76027 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9482 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-9482, GHSA-rcwj-2hj2-vmjj
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6xux-6rk7-gygr |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.5.0 |