Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.acegisecurity/acegi-security@1.0.3
Typemaven
Namespaceorg.acegisecurity
Nameacegi-security
Version1.0.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-n8yr-3aex-kyah
vulnerability_id VCID-n8yr-3aex-kyah
summary
Authentication Bypass Using an Alternate Path or Channel in SpringSource Spring Security and Acegi Security
VMware SpringSource Spring Security 2.x before 2.0.6 and 3.x before 3.0.4, and Acegi Security 1.0.0 through 1.0.7, as used in IBM WebSphere Application Server (WAS) 6.1 and 7.0, allows remote attackers to bypass security constraints via a path parameter.
references
0
reference_url http://osvdb.org/68931
reference_id
reference_type
scores
url http://osvdb.org/68931
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3700
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48062
published_at 2026-04-21T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48047
published_at 2026-04-12T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48071
published_at 2026-04-11T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48059
published_at 2026-04-13T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.48111
published_at 2026-04-16T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48106
published_at 2026-04-18T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.47991
published_at 2026-04-01T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48029
published_at 2026-04-02T12:55:00Z
8
value 0.00248
scoring_system epss
scoring_elements 0.4805
published_at 2026-04-04T12:55:00Z
9
value 0.00248
scoring_system epss
scoring_elements 0.48
published_at 2026-04-07T12:55:00Z
10
value 0.00248
scoring_system epss
scoring_elements 0.48053
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3700
2
reference_url http://secunia.com/advisories/42024
reference_id
reference_type
scores
url http://secunia.com/advisories/42024
3
reference_url https://issues.apache.org/bugzilla/show_bug.cgi?id=25015
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/bugzilla/show_bug.cgi?id=25015
4
reference_url https://web.archive.org/web/20110802082343/http://www.springsource.com/security/cve-2010-3700
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20110802082343/http://www.springsource.com/security/cve-2010-3700
5
reference_url http://www.securityfocus.com/archive/1/514517/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514517/100/0/threaded
6
reference_url http://www.securityfocus.com/bid/44496
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44496
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:acegisecurity:acegi-security:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:acegisecurity:acegi-security:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:acegisecurity:acegi-security:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:acegisecurity:acegi-security:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.3:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:acegisecurity:acegi-security:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.4:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:acegisecurity:acegi-security:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:acegisecurity:acegi-security:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.6:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:acegisecurity:acegi-security:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:acegisecurity:acegi-security:1.0.7:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:2.0.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:3.0.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:3.0.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:3.0.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:springsource_spring_security:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:springsource_spring_security:3.0.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3700
reference_id CVE-2010-3700
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-3700
28
reference_url http://www.springsource.com/security/cve-2010-3700
reference_id CVE-2010-3700
reference_type
scores
url http://www.springsource.com/security/cve-2010-3700
29
reference_url https://github.com/advisories/GHSA-3295-h9qx-r82x
reference_id GHSA-3295-h9qx-r82x
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3295-h9qx-r82x
fixed_packages
0
url pkg:maven/org.acegisecurity/acegi-security@1.0.7
purl pkg:maven/org.acegisecurity/acegi-security@1.0.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n8yr-3aex-kyah
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.acegisecurity/acegi-security@1.0.7
aliases CVE-2010-3700, GHSA-3295-h9qx-r82x
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n8yr-3aex-kyah
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.acegisecurity/acegi-security@1.0.3