Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/62872?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/62872?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@3.5.8", "type": "maven", "namespace": "org.apache.cxf", "name": "cxf-core", "version": "3.5.8", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "3.5.11", "latest_non_vulnerable_version": "4.1.1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/29957?format=api", "vulnerability_id": "VCID-b3sp-rdja-cuf5", "summary": "Apache CXF is vulnerable to DoS attacks as entire files are read into memory and logged\nApache CXF stores large stream based messages as temporary files on the local filesystem. A bug was introduced which means that the entire temporary file is read into memory and then logged. An attacker might be able to exploit this to cause a denial of service attack by causing an out of memory exception. In addition, it is possible to configure CXF to encrypt temporary files to prevent sensitive credentials from being cached unencrypted on the local filesystem, however this bug means that the cached files are written out to logs unencrypted.\n\nUsers are recommended to upgrade to versions 3.5.11, 3.6.6, 4.0.7 or 4.1.1, which fixes this issue.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48795.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48795.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48795", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25233", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25159", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26373", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3094", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30853", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30897", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-48795" }, { "reference_url": "https://github.com/apache/cxf", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/cxf" }, { "reference_url": "https://github.com/apache/cxf/commit/1c1d687f8e295f433a3592a3bc0b0a63c432bfde", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/cxf/commit/1c1d687f8e295f433a3592a3bc0b0a63c432bfde" }, { "reference_url": "https://github.com/apache/cxf/pull/2258", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/cxf/pull/2258" }, { "reference_url": "https://lists.apache.org/thread/vo5qv02mvv5plmb6z2xf1ktjmrpv3jmn", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-15T20:44:08Z/" } ], "url": "https://lists.apache.org/thread/vo5qv02mvv5plmb6z2xf1ktjmrpv3jmn" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48795", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48795" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2025/07/15/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2025/07/15/3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380189", "reference_id": "2380189", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380189" }, { "reference_url": "https://github.com/advisories/GHSA-36wv-v2qp-v4g4", "reference_id": "GHSA-36wv-v2qp-v4g4", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-36wv-v2qp-v4g4" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/70688?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@3.5.11", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@3.5.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/70689?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@3.6.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@3.6.6" }, { "url": "http://public2.vulnerablecode.io/api/packages/70690?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@4.0.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@4.0.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/70691?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@4.1.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@4.1.1" } ], "aliases": [ "CVE-2025-48795", "GHSA-36wv-v2qp-v4g4" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3sp-rdja-cuf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/25791?format=api", "vulnerability_id": "VCID-ytk3-rjrf-wfh9", "summary": "Apache CXF: Denial of Service vulnerability with temporary files\nA potential denial of service vulnerability is present in versions of Apache CXF before 3.5.10, 3.6.5 and 4.0.6. In some edge cases, the CachedOutputStream instances may not be closed and, if backed by temporary files, may fill up the file system (it applies to servers and clients).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23184.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23184.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-23184", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29672", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29722", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29768", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29765", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29729", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29851", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-23184" }, { "reference_url": "https://github.com/apache/cxf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/cxf" }, { "reference_url": "https://github.com/apache/cxf/pull/2048", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/cxf/pull/2048" }, { "reference_url": "https://github.com/apache/cxf/pull/2111", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/cxf/pull/2111" }, { "reference_url": "https://issues.apache.org/jira/browse/CXF-7396", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/CXF-7396" }, { "reference_url": "https://lists.apache.org/thread/lfs8l63rnctnj2skfrxyys7v8fgnt122", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-21T15:12:38Z/" } ], "url": "https://lists.apache.org/thread/lfs8l63rnctnj2skfrxyys7v8fgnt122" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23184", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23184" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20250214-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20250214-0003" }, { "reference_url": "https://www.vicarius.io/vsociety/posts/cve-2025-23184-detect-apache-cxf-vulnerability", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.vicarius.io/vsociety/posts/cve-2025-23184-detect-apache-cxf-vulnerability" }, { "reference_url": "https://www.vicarius.io/vsociety/posts/cve-2025-23184-mitigate-apache-cxf-vulnerability", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.vicarius.io/vsociety/posts/cve-2025-23184-mitigate-apache-cxf-vulnerability" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2025/01/20/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2025/01/20/3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339095", "reference_id": "2339095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339095" }, { "reference_url": "https://github.com/advisories/GHSA-fh5r-crhr-qrrq", "reference_id": "GHSA-fh5r-crhr-qrrq", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-fh5r-crhr-qrrq" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10452", "reference_id": "RHSA-2025:10452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10453", "reference_id": "RHSA-2025:10453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10459", "reference_id": "RHSA-2025:10459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10931", "reference_id": "RHSA-2025:10931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10931" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/69054?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@3.5.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-b3sp-rdja-cuf5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@3.5.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/69055?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@3.6.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-b3sp-rdja-cuf5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@3.6.5" }, { "url": "http://public2.vulnerablecode.io/api/packages/69056?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@4.0.6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-b3sp-rdja-cuf5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@4.0.6" } ], "aliases": [ "CVE-2025-23184", "GHSA-fh5r-crhr-qrrq" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ytk3-rjrf-wfh9" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16621?format=api", "vulnerability_id": "VCID-efw6-swgm-4fbc", "summary": "SSRF vulnerability using the Aegis DataBinding in Apache CXF\nA SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (including the default databinding) are not impacted.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28752.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28752.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28752", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69148", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74016", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.55152", "scoring_system": "epss", "scoring_elements": "0.98057", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.55152", "scoring_system": "epss", "scoring_elements": "0.98062", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.55152", "scoring_system": "epss", "scoring_elements": "0.98052", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.55152", "scoring_system": "epss", "scoring_elements": "0.98056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.55152", "scoring_system": "epss", "scoring_elements": "0.98061", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.57136", "scoring_system": "epss", "scoring_elements": "0.98152", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28752" }, { "reference_url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" }, { "value": "9.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-20T03:55:33Z/" } ], "url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt" }, { "reference_url": "https://github.com/apache/cxf", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" }, { "value": "9.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/cxf" }, { "reference_url": "https://github.com/apache/cxf/commit/d0baeb3ee64c6d7c883bd2f5c4cb0de6b0b5f463", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" }, { "value": "9.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/cxf/commit/d0baeb3ee64c6d7c883bd2f5c4cb0de6b0b5f463" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" }, { "value": "9.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240517-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" }, { "value": "9.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240517-0001" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/14/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" }, { "value": "9.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-20T03:55:33Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/03/14/3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732", "reference_id": "2270732", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "reference_url": "https://github.com/advisories/GHSA-qmgx-j96g-4428", "reference_id": "GHSA-qmgx-j96g-4428", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-qmgx-j96g-4428" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240517-0001/", "reference_id": "ntap-20240517-0001", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-20T03:55:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240517-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2834", "reference_id": "RHSA-2024:2834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2852", "reference_id": "RHSA-2024:2852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2852" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3708", "reference_id": "RHSA-2024:3708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5479", "reference_id": "RHSA-2024:5479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5481", "reference_id": "RHSA-2024:5481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5482", "reference_id": "RHSA-2024:5482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5482" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8339", "reference_id": "RHSA-2024:8339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8339" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/62872?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@3.5.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-b3sp-rdja-cuf5" }, { "vulnerability": "VCID-ytk3-rjrf-wfh9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@3.5.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/62873?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@3.6.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-b3sp-rdja-cuf5" }, { "vulnerability": "VCID-ytk3-rjrf-wfh9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@3.6.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/62874?format=api", "purl": "pkg:maven/org.apache.cxf/cxf-core@4.0.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-b3sp-rdja-cuf5" }, { "vulnerability": "VCID-ytk3-rjrf-wfh9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@4.0.4" } ], "aliases": [ "CVE-2024-28752", "GHSA-qmgx-j96g-4428" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-efw6-swgm-4fbc" } ], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.cxf/cxf-core@3.5.8" }