Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.mina/mina-core@2.0.10
Typemaven
Namespaceorg.apache.mina
Namemina-core
Version2.0.10
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.1.5
Latest_non_vulnerable_version2.2.4
Affected_by_vulnerabilities
0
url VCID-xf21-5r67-n7hg
vulnerability_id VCID-xf21-5r67-n7hg
summary
Loop with Unreachable Exit Condition ('Infinite Loop')
In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41973.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41973.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-41973
reference_id
reference_type
scores
0
value 0.0084
scoring_system epss
scoring_elements 0.74755
published_at 2026-04-18T12:55:00Z
1
value 0.0084
scoring_system epss
scoring_elements 0.74666
published_at 2026-04-01T12:55:00Z
2
value 0.0084
scoring_system epss
scoring_elements 0.74669
published_at 2026-04-02T12:55:00Z
3
value 0.0084
scoring_system epss
scoring_elements 0.74695
published_at 2026-04-04T12:55:00Z
4
value 0.0084
scoring_system epss
scoring_elements 0.7467
published_at 2026-04-07T12:55:00Z
5
value 0.0084
scoring_system epss
scoring_elements 0.74702
published_at 2026-04-08T12:55:00Z
6
value 0.0084
scoring_system epss
scoring_elements 0.74716
published_at 2026-04-09T12:55:00Z
7
value 0.0084
scoring_system epss
scoring_elements 0.7474
published_at 2026-04-11T12:55:00Z
8
value 0.0084
scoring_system epss
scoring_elements 0.74719
published_at 2026-04-12T12:55:00Z
9
value 0.0084
scoring_system epss
scoring_elements 0.7471
published_at 2026-04-13T12:55:00Z
10
value 0.0084
scoring_system epss
scoring_elements 0.74747
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-41973
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41973
3
reference_url https://lists.apache.org/thread.html/r0b907da9340d5ff4e6c1a4798ef4e79700a668657f27cca8a39e9250%40%3Cdev.mina.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r0b907da9340d5ff4e6c1a4798ef4e79700a668657f27cca8a39e9250%40%3Cdev.mina.apache.org%3E
4
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
5
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/2
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2021/11/01/2
6
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2021/11/01/8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2027176
reference_id 2027176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2027176
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-41973
reference_id CVE-2021-41973
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-41973
9
reference_url https://github.com/advisories/GHSA-6mcm-j9cj-3vc3
reference_id GHSA-6mcm-j9cj-3vc3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6mcm-j9cj-3vc3
fixed_packages
0
url pkg:maven/org.apache.mina/mina-core@2.0.22
purl pkg:maven/org.apache.mina/mina-core@2.0.22
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xf21-5r67-n7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.mina/mina-core@2.0.22
1
url pkg:maven/org.apache.mina/mina-core@2.1.5
purl pkg:maven/org.apache.mina/mina-core@2.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.mina/mina-core@2.1.5
aliases CVE-2021-41973, GHSA-6mcm-j9cj-3vc3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xf21-5r67-n7hg
1
url VCID-z6er-42pm-7ubq
vulnerability_id VCID-z6er-42pm-7ubq
summary
Cleartext Transmission of Sensitive Information in Apache MINA
Handling of the close_notify SSL/TLS message does not lead to a connection closure, leading the server to retain the socket opened and to have the client potentially receive clear text messages afterward. Mitigation: 2.0.20 users should migrate to 2.0.21, 2.1.0 users should migrate to 2.1.1. This issue affects: Apache MINA.
references
0
reference_url http://mina.apache.org/mina-project/index.html#mina-211-mina-2021-released-posted-on-april-14-2019
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://mina.apache.org/mina-project/index.html#mina-211-mina-2021-released-posted-on-april-14-2019
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0231.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0231.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0231
reference_id
reference_type
scores
0
value 0.00707
scoring_system epss
scoring_elements 0.72187
published_at 2026-04-11T12:55:00Z
1
value 0.00707
scoring_system epss
scoring_elements 0.722
published_at 2026-04-16T12:55:00Z
2
value 0.00707
scoring_system epss
scoring_elements 0.72208
published_at 2026-04-18T12:55:00Z
3
value 0.00707
scoring_system epss
scoring_elements 0.72172
published_at 2026-04-12T12:55:00Z
4
value 0.00707
scoring_system epss
scoring_elements 0.72158
published_at 2026-04-13T12:55:00Z
5
value 0.00726
scoring_system epss
scoring_elements 0.72568
published_at 2026-04-04T12:55:00Z
6
value 0.00726
scoring_system epss
scoring_elements 0.72544
published_at 2026-04-01T12:55:00Z
7
value 0.00726
scoring_system epss
scoring_elements 0.72552
published_at 2026-04-02T12:55:00Z
8
value 0.00726
scoring_system epss
scoring_elements 0.72545
published_at 2026-04-07T12:55:00Z
9
value 0.00726
scoring_system epss
scoring_elements 0.72583
published_at 2026-04-08T12:55:00Z
10
value 0.00726
scoring_system epss
scoring_elements 0.72595
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0231
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0231
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-0231
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-0231
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102216
reference_id 1102216
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102216
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1700016
reference_id 1700016
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1700016
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mina:2.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:mina:2.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mina:2.0.20:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mina:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:mina:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mina:2.1.1:*:*:*:*:*:*:*
9
reference_url https://github.com/advisories/GHSA-5h29-qq92-wj7f
reference_id GHSA-5h29-qq92-wj7f
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5h29-qq92-wj7f
10
reference_url https://access.redhat.com/errata/RHSA-2020:0895
reference_id RHSA-2020:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0895
11
reference_url https://access.redhat.com/errata/RHSA-2020:0899
reference_id RHSA-2020:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0899
12
reference_url https://access.redhat.com/errata/RHSA-2020:1454
reference_id RHSA-2020:1454
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1454
13
reference_url https://access.redhat.com/errata/RHSA-2020:3192
reference_id RHSA-2020:3192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3192
fixed_packages
0
url pkg:maven/org.apache.mina/mina-core@2.0.21
purl pkg:maven/org.apache.mina/mina-core@2.0.21
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xf21-5r67-n7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.mina/mina-core@2.0.21
1
url pkg:maven/org.apache.mina/mina-core@2.1.1
purl pkg:maven/org.apache.mina/mina-core@2.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xf21-5r67-n7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.mina/mina-core@2.1.1
aliases CVE-2019-0231, GHSA-5h29-qq92-wj7f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6er-42pm-7ubq
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.mina/mina-core@2.0.10