Lookup for vulnerable packages by Package URL.

Purlpkg:maven/io.undertow/undertow-core@2.0.0
Typemaven
Namespaceio.undertow
Nameundertow-core
Version2.0.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.3.20.Final
Latest_non_vulnerable_version2.4.0.Beta1
Affected_by_vulnerabilities
0
url VCID-2e2u-nvuu-kfbs
vulnerability_id VCID-2e2u-nvuu-kfbs
summary
Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling)
Invalid characters are allowed in query strings and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
references
0
reference_url https://access.redhat.com/errata/RHSA-2017:3454
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3454
1
reference_url https://access.redhat.com/errata/RHSA-2017:3455
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3455
2
reference_url https://access.redhat.com/errata/RHSA-2017:3456
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3456
3
reference_url https://access.redhat.com/errata/RHSA-2017:3458
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3458
4
reference_url https://access.redhat.com/errata/RHSA-2018:0002
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0002
5
reference_url https://access.redhat.com/errata/RHSA-2018:0003
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0003
6
reference_url https://access.redhat.com/errata/RHSA-2018:0004
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0004
7
reference_url https://access.redhat.com/errata/RHSA-2018:0005
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0005
8
reference_url https://access.redhat.com/errata/RHSA-2018:1322
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1322
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7559.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7559.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7559
reference_id
reference_type
scores
0
value 0.01128
scoring_system epss
scoring_elements 0.78326
published_at 2026-04-21T12:55:00Z
1
value 0.01128
scoring_system epss
scoring_elements 0.78329
published_at 2026-04-18T12:55:00Z
2
value 0.01128
scoring_system epss
scoring_elements 0.78293
published_at 2026-04-08T12:55:00Z
3
value 0.01128
scoring_system epss
scoring_elements 0.78254
published_at 2026-04-02T12:55:00Z
4
value 0.01128
scoring_system epss
scoring_elements 0.78285
published_at 2026-04-04T12:55:00Z
5
value 0.01128
scoring_system epss
scoring_elements 0.78267
published_at 2026-04-07T12:55:00Z
6
value 0.01128
scoring_system epss
scoring_elements 0.78299
published_at 2026-04-09T12:55:00Z
7
value 0.01128
scoring_system epss
scoring_elements 0.78331
published_at 2026-04-16T12:55:00Z
8
value 0.01128
scoring_system epss
scoring_elements 0.78302
published_at 2026-04-13T12:55:00Z
9
value 0.01128
scoring_system epss
scoring_elements 0.78246
published_at 2026-04-01T12:55:00Z
10
value 0.01128
scoring_system epss
scoring_elements 0.78307
published_at 2026-04-12T12:55:00Z
11
value 0.01128
scoring_system epss
scoring_elements 0.78324
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7559
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7559
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7559
12
reference_url https://github.com/undertow-io/undertow
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/undertow-io/undertow
13
reference_url https://issues.jboss.org/browse/UNDERTOW-1251
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.jboss.org/browse/UNDERTOW-1251
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1481665
reference_id 1481665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1481665
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=885576
reference_id 885576
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=885576
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:undertow:2.0.0:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:undertow:2.0.0:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:undertow:2.0.0:alpha1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7559
reference_id CVE-2017-7559
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-7559
19
reference_url https://github.com/advisories/GHSA-rj76-h87p-r3wf
reference_id GHSA-rj76-h87p-r3wf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rj76-h87p-r3wf
fixed_packages
0
url pkg:maven/io.undertow/undertow-core@2.0.1.Final
purl pkg:maven/io.undertow/undertow-core@2.0.1.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-14ff-vn3t-vyhy
1
vulnerability VCID-1vrj-chs2-d3ab
2
vulnerability VCID-2cv5-9v62-kfbm
3
vulnerability VCID-2ez8-r9wv-53du
4
vulnerability VCID-4v1f-kt5y-w7d1
5
vulnerability VCID-5585-a76n-zubf
6
vulnerability VCID-62gn-nwup-8uat
7
vulnerability VCID-73st-24ck-uydb
8
vulnerability VCID-7ec2-9kmy-77eh
9
vulnerability VCID-7yc7-e35f-8uhj
10
vulnerability VCID-93ut-2de3-ckc5
11
vulnerability VCID-bhrz-ea7j-k3bh
12
vulnerability VCID-bm42-byxp-2kb5
13
vulnerability VCID-bpuw-kn4r-6kau
14
vulnerability VCID-cf5j-2dz8-7bbu
15
vulnerability VCID-dvxb-wu3m-xuaz
16
vulnerability VCID-gsr8-1dea-effx
17
vulnerability VCID-k6c9-mckm-cyhy
18
vulnerability VCID-ns3p-22xg-q3bz
19
vulnerability VCID-p9y4-yce4-zqbk
20
vulnerability VCID-rqvc-k1jm-9kg9
21
vulnerability VCID-scjb-1mwk-rfdd
22
vulnerability VCID-sxup-wzjc-tue1
23
vulnerability VCID-urxh-sp91-kuet
24
vulnerability VCID-usz2-tufg-k7gz
25
vulnerability VCID-xftw-raz7-b7e1
26
vulnerability VCID-xme8-usmd-vqg3
27
vulnerability VCID-yn69-8upm-7yc2
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.1.Final
aliases CVE-2017-7559, GHSA-rj76-h87p-r3wf
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2e2u-nvuu-kfbs
1
url VCID-4v1f-kt5y-w7d1
vulnerability_id VCID-4v1f-kt5y-w7d1
summary Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2764.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2764.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2764
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57338
published_at 2026-04-04T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57314
published_at 2026-04-07T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57366
published_at 2026-04-08T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57368
published_at 2026-04-16T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57383
published_at 2026-04-11T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57363
published_at 2026-04-18T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57342
published_at 2026-04-21T12:55:00Z
7
value 0.00521
scoring_system epss
scoring_elements 0.66803
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2764
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2117506
reference_id 2117506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2117506
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-2764
reference_id CVE-2022-2764
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2022-2764
4
reference_url https://access.redhat.com/errata/RHSA-2022:8790
reference_id RHSA-2022:8790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8790
5
reference_url https://access.redhat.com/errata/RHSA-2022:8791
reference_id RHSA-2022:8791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8791
6
reference_url https://access.redhat.com/errata/RHSA-2022:8792
reference_id RHSA-2022:8792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8792
7
reference_url https://access.redhat.com/errata/RHSA-2022:8793
reference_id RHSA-2022:8793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8793
fixed_packages
0
url pkg:maven/io.undertow/undertow-core@2.2.20.Final
purl pkg:maven/io.undertow/undertow-core@2.2.20.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vrj-chs2-d3ab
1
vulnerability VCID-2cv5-9v62-kfbm
2
vulnerability VCID-5585-a76n-zubf
3
vulnerability VCID-7yc7-e35f-8uhj
4
vulnerability VCID-ns3p-22xg-q3bz
5
vulnerability VCID-usz2-tufg-k7gz
6
vulnerability VCID-xme8-usmd-vqg3
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.2.20.Final
1
url pkg:maven/io.undertow/undertow-core@2.3.1.Final
purl pkg:maven/io.undertow/undertow-core@2.3.1.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vrj-chs2-d3ab
1
vulnerability VCID-2cv5-9v62-kfbm
2
vulnerability VCID-5585-a76n-zubf
3
vulnerability VCID-ns3p-22xg-q3bz
4
vulnerability VCID-usz2-tufg-k7gz
5
vulnerability VCID-xme8-usmd-vqg3
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.3.1.Final
aliases CVE-2022-2764
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4v1f-kt5y-w7d1
2
url VCID-ay2f-3xcv-dqdc
vulnerability_id VCID-ay2f-3xcv-dqdc
summary
Improper Neutralization of CRLF Sequences in HTTP Headers
CRLF injection vulnerability in the Undertow web server allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1838.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1838.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1839.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1839.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1840.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1840.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1841.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1841.html
4
reference_url https://access.redhat.com/errata/RHSA-2017:3454
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3454
5
reference_url https://access.redhat.com/errata/RHSA-2017:3455
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3455
6
reference_url https://access.redhat.com/errata/RHSA-2017:3456
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3456
7
reference_url https://access.redhat.com/errata/RHSA-2017:3458
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3458
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4993.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4993.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4993
reference_id
reference_type
scores
0
value 0.01476
scoring_system epss
scoring_elements 0.81
published_at 2026-04-21T12:55:00Z
1
value 0.01476
scoring_system epss
scoring_elements 0.80913
published_at 2026-04-02T12:55:00Z
2
value 0.01476
scoring_system epss
scoring_elements 0.80935
published_at 2026-04-04T12:55:00Z
3
value 0.01476
scoring_system epss
scoring_elements 0.80932
published_at 2026-04-07T12:55:00Z
4
value 0.01476
scoring_system epss
scoring_elements 0.8096
published_at 2026-04-08T12:55:00Z
5
value 0.01476
scoring_system epss
scoring_elements 0.80967
published_at 2026-04-09T12:55:00Z
6
value 0.01476
scoring_system epss
scoring_elements 0.80984
published_at 2026-04-11T12:55:00Z
7
value 0.01476
scoring_system epss
scoring_elements 0.8097
published_at 2026-04-12T12:55:00Z
8
value 0.01476
scoring_system epss
scoring_elements 0.80962
published_at 2026-04-13T12:55:00Z
9
value 0.01476
scoring_system epss
scoring_elements 0.80999
published_at 2026-04-16T12:55:00Z
10
value 0.01476
scoring_system epss
scoring_elements 0.80904
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4993
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1344321
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1344321
11
reference_url https://github.com/undertow-io/undertow/commit/834496fb74ddda2af197940c70d08bab419fdf12
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/undertow-io/undertow/commit/834496fb74ddda2af197940c70d08bab419fdf12
12
reference_url https://issues.redhat.com/browse/UNDERTOW-827
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/UNDERTOW-827
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4993
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-4993
14
reference_url https://access.redhat.com/security/cve/CVE-2016-4993
reference_id CVE-2016-4993
reference_type
scores
url https://access.redhat.com/security/cve/CVE-2016-4993
15
reference_url https://github.com/advisories/GHSA-qcqr-hcjq-whfq
reference_id GHSA-qcqr-hcjq-whfq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qcqr-hcjq-whfq
16
reference_url https://access.redhat.com/errata/RHSA-2016:1838
reference_id RHSA-2016:1838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1838
17
reference_url https://access.redhat.com/errata/RHSA-2016:1839
reference_id RHSA-2016:1839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1839
18
reference_url https://access.redhat.com/errata/RHSA-2016:1840
reference_id RHSA-2016:1840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1840
19
reference_url https://access.redhat.com/errata/RHSA-2016:1841
reference_id RHSA-2016:1841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1841
fixed_packages
0
url pkg:maven/io.undertow/undertow-core@2.0.1
purl pkg:maven/io.undertow/undertow-core@2.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.1
1
url pkg:maven/io.undertow/undertow-core@2.0.1.Final
purl pkg:maven/io.undertow/undertow-core@2.0.1.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-14ff-vn3t-vyhy
1
vulnerability VCID-1vrj-chs2-d3ab
2
vulnerability VCID-2cv5-9v62-kfbm
3
vulnerability VCID-2ez8-r9wv-53du
4
vulnerability VCID-4v1f-kt5y-w7d1
5
vulnerability VCID-5585-a76n-zubf
6
vulnerability VCID-62gn-nwup-8uat
7
vulnerability VCID-73st-24ck-uydb
8
vulnerability VCID-7ec2-9kmy-77eh
9
vulnerability VCID-7yc7-e35f-8uhj
10
vulnerability VCID-93ut-2de3-ckc5
11
vulnerability VCID-bhrz-ea7j-k3bh
12
vulnerability VCID-bm42-byxp-2kb5
13
vulnerability VCID-bpuw-kn4r-6kau
14
vulnerability VCID-cf5j-2dz8-7bbu
15
vulnerability VCID-dvxb-wu3m-xuaz
16
vulnerability VCID-gsr8-1dea-effx
17
vulnerability VCID-k6c9-mckm-cyhy
18
vulnerability VCID-ns3p-22xg-q3bz
19
vulnerability VCID-p9y4-yce4-zqbk
20
vulnerability VCID-rqvc-k1jm-9kg9
21
vulnerability VCID-scjb-1mwk-rfdd
22
vulnerability VCID-sxup-wzjc-tue1
23
vulnerability VCID-urxh-sp91-kuet
24
vulnerability VCID-usz2-tufg-k7gz
25
vulnerability VCID-xftw-raz7-b7e1
26
vulnerability VCID-xme8-usmd-vqg3
27
vulnerability VCID-yn69-8upm-7yc2
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.1.Final
aliases CVE-2016-4993, GHSA-qcqr-hcjq-whfq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ay2f-3xcv-dqdc
3
url VCID-bm42-byxp-2kb5
vulnerability_id VCID-bm42-byxp-2kb5
summary In Undertow before versions 7.1.2.CR1, 7.1.2.GA it was found that the fix for CVE-2016-4993 was incomplete and Undertow web server is vulnerable to the injection of arbitrary HTTP headers, and also response splitting, due to insufficient sanitization and validation of user input before the input is used as part of an HTTP header value.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:1247
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1247
1
reference_url https://access.redhat.com/errata/RHSA-2018:1248
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1248
2
reference_url https://access.redhat.com/errata/RHSA-2018:1249
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1249
3
reference_url https://access.redhat.com/errata/RHSA-2018:1251
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1251
4
reference_url https://access.redhat.com/errata/RHSA-2018:2643
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:2643
5
reference_url https://access.redhat.com/errata/RHSA-2019:0877
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:0877
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1067.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1067.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1067
reference_id
reference_type
scores
0
value 0.00626
scoring_system epss
scoring_elements 0.70222
published_at 2026-04-21T12:55:00Z
1
value 0.00626
scoring_system epss
scoring_elements 0.70182
published_at 2026-04-08T12:55:00Z
2
value 0.00626
scoring_system epss
scoring_elements 0.70198
published_at 2026-04-09T12:55:00Z
3
value 0.00626
scoring_system epss
scoring_elements 0.70221
published_at 2026-04-11T12:55:00Z
4
value 0.00626
scoring_system epss
scoring_elements 0.70206
published_at 2026-04-12T12:55:00Z
5
value 0.00626
scoring_system epss
scoring_elements 0.70193
published_at 2026-04-13T12:55:00Z
6
value 0.00626
scoring_system epss
scoring_elements 0.70234
published_at 2026-04-16T12:55:00Z
7
value 0.00626
scoring_system epss
scoring_elements 0.70243
published_at 2026-04-18T12:55:00Z
8
value 0.00626
scoring_system epss
scoring_elements 0.70128
published_at 2026-04-01T12:55:00Z
9
value 0.00626
scoring_system epss
scoring_elements 0.70141
published_at 2026-04-02T12:55:00Z
10
value 0.00626
scoring_system epss
scoring_elements 0.70157
published_at 2026-04-04T12:55:00Z
11
value 0.00626
scoring_system epss
scoring_elements 0.70134
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1067
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1067
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1067
9
reference_url https://github.com/undertow-io/undertow/commit/85d4478e598105fe94ac152d3e11e388374e8b8
reference_id
reference_type
scores
url https://github.com/undertow-io/undertow/commit/85d4478e598105fe94ac152d3e11e388374e8b8
10
reference_url https://github.com/undertow-io/undertow/commit/f404cb68448c188f4d51b085b7fe4ac32bde26e
reference_id
reference_type
scores
url https://github.com/undertow-io/undertow/commit/f404cb68448c188f4d51b085b7fe4ac32bde26e
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1550671
reference_id 1550671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1550671
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900323
reference_id 900323
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900323
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1067
reference_id CVE-2018-1067
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
2
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1067
19
reference_url https://github.com/advisories/GHSA-47mp-rq2x-wjf2
reference_id GHSA-47mp-rq2x-wjf2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-47mp-rq2x-wjf2
20
reference_url https://access.redhat.com/errata/RHSA-2020:2562
reference_id RHSA-2020:2562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2562
fixed_packages
0
url pkg:maven/io.undertow/undertow-core@2.0.5.Final
purl pkg:maven/io.undertow/undertow-core@2.0.5.Final
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-14ff-vn3t-vyhy
1
vulnerability VCID-1vrj-chs2-d3ab
2
vulnerability VCID-2cv5-9v62-kfbm
3
vulnerability VCID-4v1f-kt5y-w7d1
4
vulnerability VCID-5585-a76n-zubf
5
vulnerability VCID-62gn-nwup-8uat
6
vulnerability VCID-73st-24ck-uydb
7
vulnerability VCID-7yc7-e35f-8uhj
8
vulnerability VCID-93ut-2de3-ckc5
9
vulnerability VCID-bhrz-ea7j-k3bh
10
vulnerability VCID-bpuw-kn4r-6kau
11
vulnerability VCID-cf5j-2dz8-7bbu
12
vulnerability VCID-dvxb-wu3m-xuaz
13
vulnerability VCID-gsr8-1dea-effx
14
vulnerability VCID-k6c9-mckm-cyhy
15
vulnerability VCID-ns3p-22xg-q3bz
16
vulnerability VCID-p9y4-yce4-zqbk
17
vulnerability VCID-rqvc-k1jm-9kg9
18
vulnerability VCID-scjb-1mwk-rfdd
19
vulnerability VCID-sxup-wzjc-tue1
20
vulnerability VCID-urxh-sp91-kuet
21
vulnerability VCID-usz2-tufg-k7gz
22
vulnerability VCID-xftw-raz7-b7e1
23
vulnerability VCID-xme8-usmd-vqg3
24
vulnerability VCID-yn69-8upm-7yc2
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.5.Final
aliases CVE-2018-1067, GHSA-47mp-rq2x-wjf2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bm42-byxp-2kb5
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/io.undertow/undertow-core@2.0.0