Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jamesframework/james@3.6.2
Typemaven
Namespaceorg.jamesframework
Namejames
Version3.6.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-k6dw-17nc-xbd5
vulnerability_id VCID-k6dw-17nc-xbd5
summary
Apache James vulnerable to buffering attack
Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28220
reference_id
reference_type
scores
0
value 0.01851
scoring_system epss
scoring_elements 0.82948
published_at 2026-04-02T12:55:00Z
1
value 0.01851
scoring_system epss
scoring_elements 0.82996
published_at 2026-04-13T12:55:00Z
2
value 0.01851
scoring_system epss
scoring_elements 0.83
published_at 2026-04-12T12:55:00Z
3
value 0.01851
scoring_system epss
scoring_elements 0.83006
published_at 2026-04-11T12:55:00Z
4
value 0.01851
scoring_system epss
scoring_elements 0.8299
published_at 2026-04-09T12:55:00Z
5
value 0.01851
scoring_system epss
scoring_elements 0.82983
published_at 2026-04-08T12:55:00Z
6
value 0.01851
scoring_system epss
scoring_elements 0.82958
published_at 2026-04-07T12:55:00Z
7
value 0.01851
scoring_system epss
scoring_elements 0.82961
published_at 2026-04-04T12:55:00Z
8
value 0.09184
scoring_system epss
scoring_elements 0.92717
published_at 2026-04-24T12:55:00Z
9
value 0.09184
scoring_system epss
scoring_elements 0.92709
published_at 2026-04-18T12:55:00Z
10
value 0.09184
scoring_system epss
scoring_elements 0.92714
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28220
1
reference_url https://github.com/apache/james-project
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/james-project
2
reference_url https://james.apache.org/james/update/2022/08/26/james-3.7.1.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://james.apache.org/james/update/2022/08/26/james-3.7.1.html
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-28220
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-28220
4
reference_url http://www.openwall.com/lists/oss-security/2022/09/20/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/09/20/1
5
reference_url https://github.com/advisories/GHSA-w45j-f5g5-w94x
reference_id GHSA-w45j-f5g5-w94x
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w45j-f5g5-w94x
fixed_packages
aliases CVE-2022-28220, GHSA-w45j-f5g5-w94x
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6dw-17nc-xbd5
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jamesframework/james@3.6.2