| 0 |
| url |
VCID-14ff-vn3t-vyhy |
| vulnerability_id |
VCID-14ff-vn3t-vyhy |
| summary |
Undertow vulnerable to memory exhaustion due to buffer leak
Buffer leak on incoming WebSocket PONG message(s) in Undertow before 2.0.40 and 2.2.10 can lead to memory exhaustion and allow a denial of service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3690 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51106 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.512 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51214 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51236 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51192 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51195 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51141 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51183 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51159 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3690 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3690, GHSA-fj7c-vg2v-ccrm, GMS-2022-2964
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-14ff-vn3t-vyhy |
|
| 1 |
| url |
VCID-1vrj-chs2-d3ab |
| vulnerability_id |
VCID-1vrj-chs2-d3ab |
| summary |
Undertow Denial of Service vulnerability
A flaw was found in Undertow package. Using the FormAuthenticationMechanism, a malicious user could trigger a Denial of Service by sending crafted requests, leading the server to an OutofMemory error, exhausting the server's memory. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1674 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1674 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1675 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1675 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1676 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1676 |
|
| 3 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1677 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1677 |
|
| 4 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:2763 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:2763 |
|
| 5 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:2764 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:2764 |
|
| 6 |
|
| 7 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2023-1973 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2023-1973 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1973 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72602 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72571 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72609 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.7262 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72637 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72587 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72564 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72614 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1973 |
|
| 9 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2185662 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2185662 |
|
| 10 |
| reference_url |
https://github.com/undertow-io/undertow |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/undertow-io/undertow |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-1973, GHSA-97cq-f4jm-mv8h
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1vrj-chs2-d3ab |
|
| 2 |
| url |
VCID-1w4t-um5v-jkfv |
| vulnerability_id |
VCID-1w4t-um5v-jkfv |
| summary |
Path Traversal
The AJP connector in undertow does not use the `ALLOW_ENCODED_SLASH` option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.664 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66361 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66409 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66443 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.6643 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66326 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66365 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66391 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1048 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.0.Beta1 |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.0.Beta1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 4 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 5 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 6 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 7 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 8 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 9 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 10 |
| vulnerability |
VCID-ay2f-3xcv-dqdc |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 13 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 14 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 15 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 16 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 17 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 18 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 19 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 20 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 21 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 22 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 23 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 24 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 25 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 26 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.0.Beta1 |
|
|
| aliases |
CVE-2018-1048, GHSA-prfw-3qx6-g9xr
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1w4t-um5v-jkfv |
|
| 3 |
| url |
VCID-2cv5-9v62-kfbm |
| vulnerability_id |
VCID-2cv5-9v62-kfbm |
| summary |
Undertow Path Traversal vulnerability
A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1459 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93089 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.9307 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93073 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93081 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93085 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.9309 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93088 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1459 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-1459, GHSA-v76w-3ph8-vm66
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2cv5-9v62-kfbm |
|
| 4 |
| url |
VCID-2ez8-r9wv-53du |
| vulnerability_id |
VCID-2ez8-r9wv-53du |
| summary |
undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12196 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66551 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66479 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66518 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66543 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66563 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66576 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66583 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12196 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/io.undertow/undertow-core@1.4.19.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.4.19.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 8 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 9 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 10 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 13 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 14 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 15 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 16 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 17 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 18 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 19 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 20 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 21 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 22 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 23 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 24 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 25 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 26 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 27 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.4.19.Final |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@1.4.24.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.4.24.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 9 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 10 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 11 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 12 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 13 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 14 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 15 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 16 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 17 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 18 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 19 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 20 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 21 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 22 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 23 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 24 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 25 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 26 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 27 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 28 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.4.24.Final |
|
| 2 |
| url |
pkg:maven/io.undertow/undertow-core@1.4.25.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.4.25.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 8 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 9 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 10 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 13 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 14 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 15 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 16 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 17 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 18 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 19 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 20 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 21 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 22 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 23 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 24 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 25 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 26 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.4.25.Final |
|
| 3 |
|
| 4 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.3.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.3.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 8 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 9 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 10 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 11 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 12 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 13 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 14 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 15 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 16 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 17 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 18 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 19 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 20 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 21 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 22 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 23 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 24 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 25 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 26 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.3.Final |
|
|
| aliases |
CVE-2017-12196, GHSA-cp7v-vmv7-6x2q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2ez8-r9wv-53du |
|
| 5 |
| url |
VCID-5585-a76n-zubf |
| vulnerability_id |
VCID-5585-a76n-zubf |
| summary |
Allocation of Resources Without Limits or Throttling
A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS). |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5379 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34005 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34108 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34028 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34139 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33999 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34073 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5379 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-5379
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5585-a76n-zubf |
|
| 6 |
| url |
VCID-62gn-nwup-8uat |
| vulnerability_id |
VCID-62gn-nwup-8uat |
| summary |
undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1259 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.5052 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50604 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50611 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50608 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50651 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50628 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50614 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1259 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1259
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-62gn-nwup-8uat |
|
| 7 |
| url |
VCID-73st-24ck-uydb |
| vulnerability_id |
VCID-73st-24ck-uydb |
| summary |
HTTP Request Smuggling in Undertow
A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10687 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31396 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3139 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31527 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3157 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31387 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3144 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31471 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31474 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31432 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10687 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10687, GHSA-p9w3-gwc2-cr49
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-73st-24ck-uydb |
|
| 8 |
| url |
VCID-77xn-dtdn-hfa2 |
| vulnerability_id |
VCID-77xn-dtdn-hfa2 |
| summary |
Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling)
It was discovered in Undertow that the code that parses the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2666 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80382 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80375 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80385 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80404 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80389 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.8033 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80337 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80357 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2666 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@1.3.31.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.3.31.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 9 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 10 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 13 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 14 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 15 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 16 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 17 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 18 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 19 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 20 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 21 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 22 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 23 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 24 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 25 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 26 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 27 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.3.31.Final |
|
| 2 |
|
| 3 |
| url |
pkg:maven/io.undertow/undertow-core@1.4.17.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.4.17.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 9 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 10 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 11 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 12 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 13 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 14 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 15 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 16 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 17 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 18 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 19 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 20 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 21 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 22 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 23 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 24 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 25 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 26 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 27 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 28 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.4.17.Final |
|
| 4 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.0.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.0.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-2e2u-nvuu-kfbs |
|
| 4 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 9 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 10 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 11 |
| vulnerability |
VCID-ay2f-3xcv-dqdc |
|
| 12 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 13 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 14 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 15 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 16 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 17 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 18 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 19 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 20 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 21 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 22 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 23 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 24 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 25 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 26 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 27 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 28 |
| vulnerability |
VCID-ygp7-kj2w-syat |
|
| 29 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.0.Final |
|
| 5 |
|
|
| aliases |
CVE-2017-2666, GHSA-mcfm-h73v-635m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-77xn-dtdn-hfa2 |
|
| 9 |
| url |
VCID-7ec2-9kmy-77eh |
| vulnerability_id |
VCID-7ec2-9kmy-77eh |
| summary |
It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1114 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72118 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72124 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72144 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72122 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72171 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72193 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72177 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1114 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/io.undertow/undertow-core@1.4.25.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.4.25.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 8 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 9 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 10 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 13 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 14 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 15 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 16 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 17 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 18 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 19 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 20 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 21 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 22 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 23 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 24 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 25 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 26 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.4.25.Final |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.5.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.5.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 8 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 9 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 10 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 11 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 12 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 13 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 14 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 15 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 16 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 17 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 18 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 19 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 20 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 21 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 22 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 23 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 24 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.5.Final |
|
| 2 |
|
|
| aliases |
CVE-2018-1114, GHSA-gjjx-gqm4-wcgm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7ec2-9kmy-77eh |
|
| 10 |
| url |
VCID-7yc7-e35f-8uhj |
| vulnerability_id |
VCID-7yc7-e35f-8uhj |
| summary |
Uncontrolled Resource Consumption
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75357 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75348 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75305 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75328 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75346 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75358 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75296 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75379 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3223 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-3223, GHSA-65h2-wf7m-q2v8
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7yc7-e35f-8uhj |
|
| 11 |
| url |
VCID-93ut-2de3-ckc5 |
| vulnerability_id |
VCID-93ut-2de3-ckc5 |
| summary |
undertow: Double AJP response for 400 from EAP 7 results in CPING failures |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1319 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78805 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78812 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78841 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78825 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.7885 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78856 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78879 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78862 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78853 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1319 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1319
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-93ut-2de3-ckc5 |
|
| 12 |
| url |
VCID-9zut-79gt-1bgy |
| vulnerability_id |
VCID-9zut-79gt-1bgy |
| summary |
It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2670 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90659 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90631 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90639 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.9065 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90656 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90665 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90617 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90621 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2670 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/io.undertow/undertow-core@1.3.28.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.3.28.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-2e2u-nvuu-kfbs |
|
| 5 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 6 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 7 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 8 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 9 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 10 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 11 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 12 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 13 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 14 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 15 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 16 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 17 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 18 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 19 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 20 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 21 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 22 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 23 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 24 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 25 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 26 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 27 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 28 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 29 |
| vulnerability |
VCID-ygp7-kj2w-syat |
|
| 30 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.3.28.Final |
|
| 1 |
|
|
| aliases |
CVE-2017-2670, GHSA-3x7h-5hfr-hvjm
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9zut-79gt-1bgy |
|
| 13 |
| url |
VCID-ay2f-3xcv-dqdc |
| vulnerability_id |
VCID-ay2f-3xcv-dqdc |
| summary |
Improper Neutralization of CRLF Sequences in HTTP Headers
CRLF injection vulnerability in the Undertow web server allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4993 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80962 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80904 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80913 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80935 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.8096 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80967 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80984 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.8097 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4993 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/io.undertow/undertow-core@1.3.5.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.3.5.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-2e2u-nvuu-kfbs |
|
| 5 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 6 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 7 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 8 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 9 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 10 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 11 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 12 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 13 |
| vulnerability |
VCID-9zut-79gt-1bgy |
|
| 14 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 15 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 16 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 17 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 18 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 19 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 20 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 21 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 22 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 23 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 24 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 25 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 26 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 27 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 28 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 29 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 30 |
| vulnerability |
VCID-y5s2-w88t-8uhx |
|
| 31 |
| vulnerability |
VCID-ygp7-kj2w-syat |
|
| 32 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.3.5.Final |
|
| 1 |
|
| 2 |
|
| 3 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.1.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.1.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 4 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 9 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 10 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 13 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 14 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 15 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 16 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 17 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 18 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 19 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 20 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 21 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 22 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 23 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 24 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 25 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 26 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 27 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.1.Final |
|
|
| aliases |
CVE-2016-4993, GHSA-qcqr-hcjq-whfq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ay2f-3xcv-dqdc |
|
| 14 |
| url |
VCID-bhrz-ea7j-k3bh |
| vulnerability_id |
VCID-bhrz-ea7j-k3bh |
| summary |
Information Exposure
An information exposure of plain text credentials through log files because `Connectors.executeRootHandler:402` logs the `HttpServerExchange` object at `ERROR` level using `UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t,exchange)`. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3888 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68802 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68736 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68755 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68775 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68753 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68804 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68846 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68831 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3888 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.21.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.21.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 8 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 9 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 10 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 11 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 12 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 13 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 14 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 15 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 16 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 17 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 18 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 19 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 20 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 21 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.21.Final |
|
| 1 |
|
|
| aliases |
CVE-2019-3888, GHSA-jwgx-9mmh-684w
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bhrz-ea7j-k3bh |
|
| 15 |
| url |
VCID-bm42-byxp-2kb5 |
| vulnerability_id |
VCID-bm42-byxp-2kb5 |
| summary |
In Undertow before versions 7.1.2.CR1, 7.1.2.GA it was found that the fix for CVE-2016-4993 was incomplete and Undertow web server is vulnerable to the injection of arbitrary HTTP headers, and also response splitting, due to insufficient sanitization and validation of user input before the input is used as part of an HTTP header value. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1067 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70193 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70141 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70157 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70134 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70182 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70198 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70221 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70206 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70128 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1067 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-1067 |
| reference_id |
CVE-2018-1067 |
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
5.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-1067 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/io.undertow/undertow-core@1.4.25.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.4.25.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 8 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 9 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 10 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 13 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 14 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 15 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 16 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 17 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 18 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 19 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 20 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 21 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 22 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 23 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 24 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 25 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 26 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.4.25.Final |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.5.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.5.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 8 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 9 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 10 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 11 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 12 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 13 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 14 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 15 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 16 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 17 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 18 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 19 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 20 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 21 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 22 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 23 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 24 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.5.Final |
|
|
| aliases |
CVE-2018-1067, GHSA-47mp-rq2x-wjf2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bm42-byxp-2kb5 |
|
| 16 |
| url |
VCID-bpuw-kn4r-6kau |
| vulnerability_id |
VCID-bpuw-kn4r-6kau |
| summary |
HTTP request smuggling in Undertow
A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. The highest threat from this vulnerability is to data confidentiality and integrity. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20220 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39866 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39744 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39892 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.3992 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39843 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39898 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39911 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39921 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39886 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20220 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.34.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.34.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 8 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 9 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 10 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 11 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 12 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 13 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 14 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 15 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 16 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 17 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 18 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.34.Final |
|
| 2 |
|
| 3 |
|
|
| aliases |
CVE-2021-20220, GHSA-qjwc-v72v-fq6r
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bpuw-kn4r-6kau |
|
| 17 |
| url |
VCID-cf5j-2dz8-7bbu |
| vulnerability_id |
VCID-cf5j-2dz8-7bbu |
| summary |
Undertow vulnerable to Denial of Service (DoS) attacks
Undertow client side invocation timeout raised when calling over HTTP2, this vulnerability can allow attacker to carry out denial of service (DoS) attacks in versions less than 2.2.15 Final. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3859 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54154 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54104 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54106 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54054 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54051 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.5408 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54115 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54135 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54034 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3859 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3859, GHSA-339q-62wm-c39w, GMS-2022-2963
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cf5j-2dz8-7bbu |
|
| 18 |
| url |
VCID-dvxb-wu3m-xuaz |
| vulnerability_id |
VCID-dvxb-wu3m-xuaz |
| summary |
Improper Authorization in Undertoe
A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1745 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.7035 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70362 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70379 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70358 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70403 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70418 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70442 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70428 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1745 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.30.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.30.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 8 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 9 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 10 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 11 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 12 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 13 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 14 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 15 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 16 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 17 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 18 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 19 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.30.Final |
|
|
| aliases |
CVE-2020-1745, GHSA-gv2w-88hx-8m9r
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dvxb-wu3m-xuaz |
|
| 19 |
| url |
VCID-gsr8-1dea-effx |
| vulnerability_id |
VCID-gsr8-1dea-effx |
| summary |
undertow Race Condition vulnerability
A flaw was found in undertow. The HTTP2SourceChannel fails to write the final frame under some circumstances, resulting in a denial of service. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.35.SP1, prior to 2.2.6.SP1, prior to 2.2.7.SP1, prior to 2.0.36.SP1, prior to 2.2.9.Final and prior to 2.0.39.Final. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3597 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38155 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38179 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38215 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38246 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38066 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38269 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38196 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38188 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38138 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3597 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3597, GHSA-mfhv-gwf8-4m88
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gsr8-1dea-effx |
|
| 20 |
| url |
VCID-k6c9-mckm-cyhy |
| vulnerability_id |
VCID-k6c9-mckm-cyhy |
| summary |
HTTP Request Smuggling in Undertow
A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10719 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.3782 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37803 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37926 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37854 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37845 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37881 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37719 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37867 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.379 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10719 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10719, GHSA-cccf-7xw3-p2vr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k6c9-mckm-cyhy |
|
| 21 |
| url |
VCID-ns3p-22xg-q3bz |
| vulnerability_id |
VCID-ns3p-22xg-q3bz |
| summary |
Undertow MadeYouReset HTTP/2 DDoS Vulnerability
A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS). |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9784 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81427 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81371 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81394 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81392 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.8142 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81426 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81447 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81435 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9784 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
| reference_url |
https://kb.cert.org/vuls/id/767506 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-02T13:55:22Z/ |
|
|
| url |
https://kb.cert.org/vuls/id/767506 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-9784, GHSA-95h4-w6j8-2rp8
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ns3p-22xg-q3bz |
|
| 22 |
| url |
VCID-ntaz-sckf-mubx |
| vulnerability_id |
VCID-ntaz-sckf-mubx |
| summary |
Information disclosure via directory traversal
Directory traversal vulnerability in this package when running on Windows, allows remote attackers to read arbitrary files via a `..` in a resource URI. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7816 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98063 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98042 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.9805 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98052 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98057 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98062 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7816 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/io.undertow/undertow-core@1.1.0.CR5 |
| purl |
pkg:maven/io.undertow/undertow-core@1.1.0.CR5 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 9 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 10 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 11 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 12 |
| vulnerability |
VCID-9zut-79gt-1bgy |
|
| 13 |
| vulnerability |
VCID-ay2f-3xcv-dqdc |
|
| 14 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 15 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 16 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 17 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 18 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 19 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 20 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 21 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 22 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 23 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 24 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 25 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 26 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 27 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 28 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 29 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 30 |
| vulnerability |
VCID-ygp7-kj2w-syat |
|
| 31 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.1.0.CR5 |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@1.2.0.Beta3 |
| purl |
pkg:maven/io.undertow/undertow-core@1.2.0.Beta3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 9 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 10 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 11 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 12 |
| vulnerability |
VCID-9zut-79gt-1bgy |
|
| 13 |
| vulnerability |
VCID-ay2f-3xcv-dqdc |
|
| 14 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 15 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 16 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 17 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 18 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 19 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 20 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 21 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 22 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 23 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 24 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 25 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 26 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 27 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 28 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 29 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 30 |
| vulnerability |
VCID-ygp7-kj2w-syat |
|
| 31 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.2.0.Beta3 |
|
|
| aliases |
CVE-2014-7816, GHSA-h6p6-fc4w-cqhx
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ntaz-sckf-mubx |
|
| 23 |
| url |
VCID-p9y4-yce4-zqbk |
| vulnerability_id |
VCID-p9y4-yce4-zqbk |
| summary |
Undertow vulnerable to Uncontrolled Resource Consumption
A vulnerability was found in the Undertow HTTP server in versions before 2.0.29 when listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14888 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46467 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46398 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46438 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46458 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46407 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46463 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46486 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46457 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14888 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.29.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.29.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 8 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 9 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 10 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 11 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 12 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 13 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 14 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 15 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 16 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 17 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 18 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 19 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 20 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.29.Final |
|
|
| aliases |
CVE-2019-14888, GHSA-vjxc-frw4-jmh5
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p9y4-yce4-zqbk |
|
| 24 |
| url |
VCID-rqvc-k1jm-9kg9 |
| vulnerability_id |
VCID-rqvc-k1jm-9kg9 |
| summary |
Information Exposure
An information leak vulnerability was found in Undertow. If all headers are not written out in the first `write()` call, the code that handles flushing the buffer will always write out the full contents of the `writevBuffer` buffer, which may contain data from previous requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14642 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72145 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.722 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72216 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72194 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72167 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72182 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73015 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73006 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14642 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.15.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.15.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 8 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 9 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 10 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 11 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 12 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 13 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 14 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 15 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 16 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 17 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 18 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 19 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 20 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 21 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 22 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 23 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.15.Final |
|
| 2 |
|
|
| aliases |
CVE-2018-14642, GHSA-vf6r-mmhc-3xcm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rqvc-k1jm-9kg9 |
|
| 25 |
| url |
VCID-scjb-1mwk-rfdd |
| vulnerability_id |
VCID-scjb-1mwk-rfdd |
| summary |
Potential to access user credentials from the log files when debug logging enabled
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10212 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63425 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63337 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63424 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.6339 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63459 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.6346 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10212 |
|
| 4 |
|
| 5 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10212 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
4.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10212 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.20.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.20.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 8 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 9 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 10 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 11 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 12 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 13 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 14 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 15 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 16 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 17 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 18 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 19 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 20 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 21 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 22 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.20.Final |
|
|
| aliases |
CVE-2019-10212, GHSA-8vh8-vc28-m2hf
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-scjb-1mwk-rfdd |
|
| 26 |
| url |
VCID-sxup-wzjc-tue1 |
| vulnerability_id |
VCID-sxup-wzjc-tue1 |
| summary |
Improper Input Validation in Undertow
A flaw was found in all undertow-2.x.x SP1 versions prior to undertow-2.0.30.SP1, all undertow-1.x.x and undertow-2.x.x versions prior to undertow-2.1.0.Final, where the Servlet container causes servletPath to normalize incorrectly by truncating the path after semicolon which may lead to an application mapping resulting in the security bypass. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1757 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64302 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64329 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64315 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64342 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64223 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64281 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64331 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.6431 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64266 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1757 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@2.1.0.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.1.0.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 4 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 5 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 6 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 7 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 8 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 9 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 10 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 11 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 12 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 13 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 14 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 15 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 16 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 17 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 18 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.1.0.Final |
|
|
| aliases |
CVE-2020-1757, GHSA-2w73-fqqj-c92p
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sxup-wzjc-tue1 |
|
| 27 |
| url |
VCID-urxh-sp91-kuet |
| vulnerability_id |
VCID-urxh-sp91-kuet |
| summary |
Allocation of Resources Without Limits or Throttling in Undertow
A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10705 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53269 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53202 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53234 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53254 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53286 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53301 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53186 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.5325 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53209 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10705 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10705, GHSA-g4cp-h53p-v3v8
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-urxh-sp91-kuet |
|
| 28 |
| url |
VCID-usz2-tufg-k7gz |
| vulnerability_id |
VCID-usz2-tufg-k7gz |
| summary |
Undertow denial of service vulnerability
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1108 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68502 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68457 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68476 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68452 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68503 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.6852 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68546 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68534 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1108 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
| reference_url |
https://github.com/advisories/GHSA-m4mm-pg93-fv78 |
| reference_id |
GHSA-m4mm-pg93-fv78 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
HIGH |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:37:50Z/ |
|
|
| url |
https://github.com/advisories/GHSA-m4mm-pg93-fv78 |
|
| 48 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-1108, GHSA-m4mm-pg93-fv78
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-usz2-tufg-k7gz |
|
| 29 |
| url |
VCID-xftw-raz7-b7e1 |
| vulnerability_id |
VCID-xftw-raz7-b7e1 |
| summary |
Undertow vulnerable to Dos via Large AJP request
When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) as an error state and not forward requests to the worker for a while. In mod_cluster, this continues until the next STATUS request (10 seconds intervals) from the application server updates the server state. So, in the worst case, it can result in "All workers are in error state" and mod_cluster responds "503 Service Unavailable" for a while (up to 10 seconds). In mod_proxy_balancer, it does not forward requests to the worker until the "retry" timeout passes. However, luckily, mod_proxy_balancer has "forcerecovery" setting (On by default; this parameter can force the immediate recovery of all workers without considering the retry parameter of the workers if all workers of a balancer are in error state.). So, unlike mod_cluster, mod_proxy_balancer does not result in responding "503 Service Unavailable". An attacker could use this behavior to send a malicious request and trigger server errors, resulting in DoS (denial of service). This flaw was fixed in Undertow 2.2.19.Final, Undertow 2.3.0.Alpha2. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53747 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53682 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53709 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53681 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53733 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53731 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.5378 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53763 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2053 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2053, GHSA-95rf-557x-44g5
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xftw-raz7-b7e1 |
|
| 30 |
| url |
VCID-xme8-usmd-vqg3 |
| vulnerability_id |
VCID-xme8-usmd-vqg3 |
| summary |
Undertow vulnerable to Race Condition
A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:11023 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:11023 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:6508 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:6508 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:6883 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:6883 |
|
| 3 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:7441 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:7441 |
|
| 4 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:7442 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:7442 |
|
| 5 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:7735 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:7735 |
|
| 6 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:7736 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:7736 |
|
| 7 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:8080 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:8080 |
|
| 8 |
| reference_url |
https://access.redhat.com/errata/RHSA-2025:16667 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2025:16667 |
|
| 9 |
| reference_url |
https://access.redhat.com/errata/RHSA-2026:0743 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2026:0743 |
|
| 10 |
|
| 11 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-7885 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-7885 |
|
| 12 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7885 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93305 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93304 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93299 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.9332 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93319 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93321 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93317 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93312 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7885 |
|
| 13 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2305290 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2305290 |
|
| 14 |
| reference_url |
https://github.com/undertow-io/undertow |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/undertow-io/undertow |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-7885, GHSA-9623-mqmm-5rcf
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xme8-usmd-vqg3 |
|
| 31 |
| url |
VCID-ygp7-kj2w-syat |
| vulnerability_id |
VCID-ygp7-kj2w-syat |
| summary |
Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling)
It was discovered that Undertow processes http request headers with unusual whitespaces which can cause possible http request smuggling. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12165 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.78003 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.78005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.78022 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77995 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.7799 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77963 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77953 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77982 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77946 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12165 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:maven/io.undertow/undertow-core@1.3.31.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.3.31.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 9 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 10 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 13 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 14 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 15 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 16 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 17 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 18 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 19 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 20 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 21 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 22 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 23 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 24 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 25 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 26 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 27 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.3.31.Final |
|
| 2 |
|
| 3 |
| url |
pkg:maven/io.undertow/undertow-core@1.4.17.Final |
| purl |
pkg:maven/io.undertow/undertow-core@1.4.17.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-1w4t-um5v-jkfv |
|
| 3 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 4 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 9 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 10 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 11 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 12 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 13 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 14 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 15 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 16 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 17 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 18 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 19 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 20 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 21 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 22 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 23 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 24 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 25 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 26 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 27 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 28 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@1.4.17.Final |
|
| 4 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.0.Beta1 |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.0.Beta1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 4 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 5 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 6 |
| vulnerability |
VCID-77xn-dtdn-hfa2 |
|
| 7 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 8 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 9 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 10 |
| vulnerability |
VCID-ay2f-3xcv-dqdc |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 13 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 14 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 15 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 16 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 17 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 18 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 19 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 20 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 21 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 22 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 23 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 24 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 25 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 26 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.0.Beta1 |
|
| 5 |
| url |
pkg:maven/io.undertow/undertow-core@2.0.1.Final |
| purl |
pkg:maven/io.undertow/undertow-core@2.0.1.Final |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-14ff-vn3t-vyhy |
|
| 1 |
| vulnerability |
VCID-1vrj-chs2-d3ab |
|
| 2 |
| vulnerability |
VCID-2cv5-9v62-kfbm |
|
| 3 |
| vulnerability |
VCID-2ez8-r9wv-53du |
|
| 4 |
| vulnerability |
VCID-4v1f-kt5y-w7d1 |
|
| 5 |
| vulnerability |
VCID-5585-a76n-zubf |
|
| 6 |
| vulnerability |
VCID-62gn-nwup-8uat |
|
| 7 |
| vulnerability |
VCID-73st-24ck-uydb |
|
| 8 |
| vulnerability |
VCID-7ec2-9kmy-77eh |
|
| 9 |
| vulnerability |
VCID-7yc7-e35f-8uhj |
|
| 10 |
| vulnerability |
VCID-93ut-2de3-ckc5 |
|
| 11 |
| vulnerability |
VCID-bhrz-ea7j-k3bh |
|
| 12 |
| vulnerability |
VCID-bm42-byxp-2kb5 |
|
| 13 |
| vulnerability |
VCID-bpuw-kn4r-6kau |
|
| 14 |
| vulnerability |
VCID-cf5j-2dz8-7bbu |
|
| 15 |
| vulnerability |
VCID-dvxb-wu3m-xuaz |
|
| 16 |
| vulnerability |
VCID-gsr8-1dea-effx |
|
| 17 |
| vulnerability |
VCID-k6c9-mckm-cyhy |
|
| 18 |
| vulnerability |
VCID-ns3p-22xg-q3bz |
|
| 19 |
| vulnerability |
VCID-p9y4-yce4-zqbk |
|
| 20 |
| vulnerability |
VCID-rqvc-k1jm-9kg9 |
|
| 21 |
| vulnerability |
VCID-scjb-1mwk-rfdd |
|
| 22 |
| vulnerability |
VCID-sxup-wzjc-tue1 |
|
| 23 |
| vulnerability |
VCID-urxh-sp91-kuet |
|
| 24 |
| vulnerability |
VCID-usz2-tufg-k7gz |
|
| 25 |
| vulnerability |
VCID-xftw-raz7-b7e1 |
|
| 26 |
| vulnerability |
VCID-xme8-usmd-vqg3 |
|
| 27 |
| vulnerability |
VCID-yn69-8upm-7yc2 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.1.Final |
|
|
| aliases |
CVE-2017-12165, GHSA-5gg7-5wv8-4gcj
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ygp7-kj2w-syat |
|
| 32 |
| url |
VCID-yn69-8upm-7yc2 |
| vulnerability_id |
VCID-yn69-8upm-7yc2 |
| summary |
Undertow Uncontrolled Resource Consumption
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3629 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52671 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52687 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52704 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52615 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52571 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52641 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52653 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52658 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52607 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3629 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3629, GHSA-rf6q-vx79-mjxr
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yn69-8upm-7yc2 |
|