Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.james/javax-mail-extension@3.7.3
Typemaven
Namespaceorg.apache.james
Namejavax-mail-extension
Version3.7.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.7.4
Latest_non_vulnerable_version3.7.4
Affected_by_vulnerabilities
0
url VCID-tbyy-yemg-g7bk
vulnerability_id VCID-tbyy-yemg-g7bk
summary
Apache James server's JMX management service vulnerable to privilege escalation by local user
Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-26269
reference_id
reference_type
scores
0
value 0.01004
scoring_system epss
scoring_elements 0.76976
published_at 2026-04-07T12:55:00Z
1
value 0.01004
scoring_system epss
scoring_elements 0.77026
published_at 2026-04-12T12:55:00Z
2
value 0.01004
scoring_system epss
scoring_elements 0.77047
published_at 2026-04-11T12:55:00Z
3
value 0.01004
scoring_system epss
scoring_elements 0.77019
published_at 2026-04-09T12:55:00Z
4
value 0.01004
scoring_system epss
scoring_elements 0.76994
published_at 2026-04-04T12:55:00Z
5
value 0.01004
scoring_system epss
scoring_elements 0.77008
published_at 2026-04-08T12:55:00Z
6
value 0.01004
scoring_system epss
scoring_elements 0.77064
published_at 2026-04-18T12:55:00Z
7
value 0.01004
scoring_system epss
scoring_elements 0.77063
published_at 2026-04-16T12:55:00Z
8
value 0.01004
scoring_system epss
scoring_elements 0.77022
published_at 2026-04-13T12:55:00Z
9
value 0.01039
scoring_system epss
scoring_elements 0.77368
published_at 2026-04-02T12:55:00Z
10
value 0.01164
scoring_system epss
scoring_elements 0.78673
published_at 2026-04-24T12:55:00Z
11
value 0.01164
scoring_system epss
scoring_elements 0.78642
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-26269
1
reference_url https://github.com/apache/james-project
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/james-project
2
reference_url https://lists.apache.org/thread/2z44rg93pflbjhvbwy3xtz505bx41cbs
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T15:09:13Z/
url https://lists.apache.org/thread/2z44rg93pflbjhvbwy3xtz505bx41cbs
3
reference_url http://www.openwall.com/lists/oss-security/2023/04/18/3
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T15:09:13Z/
url http://www.openwall.com/lists/oss-security/2023/04/18/3
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-26269
reference_id CVE-2023-26269
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-26269
5
reference_url https://github.com/advisories/GHSA-w7r6-v4j7-h94w
reference_id GHSA-w7r6-v4j7-h94w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w7r6-v4j7-h94w
fixed_packages
0
url pkg:maven/org.apache.james/javax-mail-extension@3.7.4
purl pkg:maven/org.apache.james/javax-mail-extension@3.7.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.7.4
aliases CVE-2023-26269, GHSA-w7r6-v4j7-h94w
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbyy-yemg-g7bk
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.7.3