| 0 |
| url |
VCID-14ff-vn3t-vyhy |
| vulnerability_id |
VCID-14ff-vn3t-vyhy |
| summary |
Undertow vulnerable to memory exhaustion due to buffer leak
Buffer leak on incoming WebSocket PONG message(s) in Undertow before 2.0.40 and 2.2.10 can lead to memory exhaustion and allow a denial of service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3690 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51195 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.5117 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51223 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51246 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51239 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51106 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51159 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51183 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51141 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.512 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51214 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51236 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51192 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3690 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3690, GHSA-fj7c-vg2v-ccrm, GMS-2022-2964
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-14ff-vn3t-vyhy |
|
| 1 |
| url |
VCID-1vrj-chs2-d3ab |
| vulnerability_id |
VCID-1vrj-chs2-d3ab |
| summary |
Undertow Denial of Service vulnerability
A flaw was found in Undertow package. Using the FormAuthenticationMechanism, a malicious user could trigger a Denial of Service by sending crafted requests, leading the server to an OutofMemory error, exhausting the server's memory. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1674 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1674 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1675 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1675 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1676 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1676 |
|
| 3 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1677 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1677 |
|
| 4 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:2763 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:2763 |
|
| 5 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:2764 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:2764 |
|
| 6 |
|
| 7 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2023-1973 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2023-1973 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1973 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72652 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72571 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72694 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72653 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72662 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72587 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72564 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72602 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72614 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72637 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.7262 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72609 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1973 |
|
| 9 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2185662 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T14:06:28Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2185662 |
|
| 10 |
| reference_url |
https://github.com/undertow-io/undertow |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/undertow-io/undertow |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-1973, GHSA-97cq-f4jm-mv8h
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1vrj-chs2-d3ab |
|
| 2 |
| url |
VCID-1w4t-um5v-jkfv |
| vulnerability_id |
VCID-1w4t-um5v-jkfv |
| summary |
Path Traversal
The AJP connector in undertow does not use the `ALLOW_ENCODED_SLASH` option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66461 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.6643 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.664 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66436 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66453 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66438 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66326 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66365 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66391 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66361 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66409 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66443 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1048 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1048, GHSA-prfw-3qx6-g9xr
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1w4t-um5v-jkfv |
|
| 3 |
| url |
VCID-2cv5-9v62-kfbm |
| vulnerability_id |
VCID-2cv5-9v62-kfbm |
| summary |
Undertow Path Traversal vulnerability
A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1459 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93073 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93106 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93089 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93088 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.9309 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93085 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.9307 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93081 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.9312 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.93115 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.10104 |
| scoring_system |
epss |
| scoring_elements |
0.9311 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1459 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-1459, GHSA-v76w-3ph8-vm66
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2cv5-9v62-kfbm |
|
| 4 |
| url |
VCID-2e2u-nvuu-kfbs |
| vulnerability_id |
VCID-2e2u-nvuu-kfbs |
| summary |
Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling)
Invalid characters are allowed in query strings and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7559 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78358 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78326 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78324 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78285 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78267 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78293 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78299 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78329 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78331 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78246 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78302 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78307 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.01128 |
| scoring_system |
epss |
| scoring_elements |
0.78254 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7559 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7559 |
| reference_id |
CVE-2017-7559 |
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7559 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7559, GHSA-rj76-h87p-r3wf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2e2u-nvuu-kfbs |
|
| 5 |
| url |
VCID-2ez8-r9wv-53du |
| vulnerability_id |
VCID-2ez8-r9wv-53du |
| summary |
undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12196 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66518 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66563 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66479 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66543 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66551 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66583 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66576 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00531 |
| scoring_system |
epss |
| scoring_elements |
0.67302 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00531 |
| scoring_system |
epss |
| scoring_elements |
0.67315 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00531 |
| scoring_system |
epss |
| scoring_elements |
0.67294 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00531 |
| scoring_system |
epss |
| scoring_elements |
0.67314 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12196 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-12196, GHSA-cp7v-vmv7-6x2q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2ez8-r9wv-53du |
|
| 6 |
| url |
VCID-469b-j213-6ufk |
| vulnerability_id |
VCID-469b-j213-6ufk |
| summary |
Undertow Uncontrolled Resource Consumption Vulnerability
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available.
At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1674 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1674 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1675 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1675 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1676 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1676 |
|
| 3 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1677 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1677 |
|
| 4 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1860 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1860 |
|
| 5 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1861 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1861 |
|
| 6 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1862 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1862 |
|
| 7 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1864 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1864 |
|
| 8 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1866 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1866 |
|
| 9 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:3354 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:3354 |
|
| 10 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:4884 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:4884 |
|
| 11 |
| reference_url |
https://access.redhat.com/errata/RHSA-2025:4226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2025:4226 |
|
| 12 |
|
| 13 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-1635 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-1635 |
|
| 14 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1635 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.22688 |
| scoring_system |
epss |
| scoring_elements |
0.95855 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.22688 |
| scoring_system |
epss |
| scoring_elements |
0.95858 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.22688 |
| scoring_system |
epss |
| scoring_elements |
0.95846 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.22688 |
| scoring_system |
epss |
| scoring_elements |
0.95861 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.22688 |
| scoring_system |
epss |
| scoring_elements |
0.95862 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.22688 |
| scoring_system |
epss |
| scoring_elements |
0.95874 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.22688 |
| scoring_system |
epss |
| scoring_elements |
0.95879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.22688 |
| scoring_system |
epss |
| scoring_elements |
0.95882 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.23144 |
| scoring_system |
epss |
| scoring_elements |
0.95948 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.23144 |
| scoring_system |
epss |
| scoring_elements |
0.959 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.23144 |
| scoring_system |
epss |
| scoring_elements |
0.95909 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-1635 |
|
| 15 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2264928 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:54:05Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2264928 |
|
| 16 |
| reference_url |
https://github.com/undertow-io/undertow |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/undertow-io/undertow |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-1635, GHSA-w6qf-42m7-vh68
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-469b-j213-6ufk |
|
| 7 |
| url |
VCID-4kdg-asyc-rbdx |
| vulnerability_id |
VCID-4kdg-asyc-rbdx |
| summary |
Undertow Missing Authorization when requesting a protected directory without trailing slash
undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10184 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01424 |
| scoring_system |
epss |
| scoring_elements |
0.80584 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.01424 |
| scoring_system |
epss |
| scoring_elements |
0.80555 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01424 |
| scoring_system |
epss |
| scoring_elements |
0.80562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01424 |
| scoring_system |
epss |
| scoring_elements |
0.80576 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01424 |
| scoring_system |
epss |
| scoring_elements |
0.80604 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01424 |
| scoring_system |
epss |
| scoring_elements |
0.80614 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01424 |
| scoring_system |
epss |
| scoring_elements |
0.80631 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01424 |
| scoring_system |
epss |
| scoring_elements |
0.80618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01424 |
| scoring_system |
epss |
| scoring_elements |
0.80609 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.8124 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81219 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.8122 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81218 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10184 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10184, GHSA-w69w-jvc7-wjgv
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4kdg-asyc-rbdx |
|
| 8 |
| url |
VCID-4v1f-kt5y-w7d1 |
| vulnerability_id |
VCID-4v1f-kt5y-w7d1 |
| summary |
Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2764 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57338 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57314 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57366 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57368 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57383 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57363 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57342 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57299 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00521 |
| scoring_system |
epss |
| scoring_elements |
0.66803 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2764 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2764
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4v1f-kt5y-w7d1 |
|
| 9 |
| url |
VCID-5585-a76n-zubf |
| vulnerability_id |
VCID-5585-a76n-zubf |
| summary |
Allocation of Resources Without Limits or Throttling
A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS). |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5379 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33623 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34108 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.3404 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33994 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34139 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33999 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34073 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34028 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34005 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5379 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-5379
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5585-a76n-zubf |
|
| 10 |
| url |
VCID-62gn-nwup-8uat |
| vulnerability_id |
VCID-62gn-nwup-8uat |
| summary |
undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1259 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.5052 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50604 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50611 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50608 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50651 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50628 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50614 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50656 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50661 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.5064 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50588 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1259 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1259
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-62gn-nwup-8uat |
|
| 11 |
| url |
VCID-73st-24ck-uydb |
| vulnerability_id |
VCID-73st-24ck-uydb |
| summary |
HTTP Request Smuggling in Undertow
A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10687 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3121 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31387 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3144 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31471 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31474 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31432 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31396 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31429 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31409 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3138 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3139 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31527 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3157 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10687 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10687, GHSA-p9w3-gwc2-cr49
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-73st-24ck-uydb |
|
| 12 |
| url |
VCID-77xn-dtdn-hfa2 |
| vulnerability_id |
VCID-77xn-dtdn-hfa2 |
| summary |
Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling)
It was discovered in Undertow that the code that parses the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2666 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80442 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80389 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80382 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80411 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80412 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80416 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.8033 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80337 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80357 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80375 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80385 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.01394 |
| scoring_system |
epss |
| scoring_elements |
0.80404 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2666 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2666, GHSA-mcfm-h73v-635m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-77xn-dtdn-hfa2 |
|
| 13 |
| url |
VCID-7ec2-9kmy-77eh |
| vulnerability_id |
VCID-7ec2-9kmy-77eh |
| summary |
It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1114 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72122 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72171 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72193 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72177 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72214 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72199 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72118 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72124 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72144 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1114 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1114, GHSA-gjjx-gqm4-wcgm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7ec2-9kmy-77eh |
|
| 14 |
| url |
VCID-7yc7-e35f-8uhj |
| vulnerability_id |
VCID-7yc7-e35f-8uhj |
| summary |
Uncontrolled Resource Consumption
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75417 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75296 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75328 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75305 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75348 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75358 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75379 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75357 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75346 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75386 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75392 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00879 |
| scoring_system |
epss |
| scoring_elements |
0.75383 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-3223 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-3223, GHSA-65h2-wf7m-q2v8
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7yc7-e35f-8uhj |
|
| 15 |
| url |
VCID-93ut-2de3-ckc5 |
| vulnerability_id |
VCID-93ut-2de3-ckc5 |
| summary |
undertow: Double AJP response for 400 from EAP 7 results in CPING failures |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1319 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78805 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78812 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78841 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78825 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.7885 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78856 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78862 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78853 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78881 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.01193 |
| scoring_system |
epss |
| scoring_elements |
0.78904 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1319 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1319
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-93ut-2de3-ckc5 |
|
| 16 |
| url |
VCID-9zut-79gt-1bgy |
| vulnerability_id |
VCID-9zut-79gt-1bgy |
| summary |
It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2670 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90688 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90665 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90659 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90678 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90676 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90673 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90617 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90621 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90631 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90639 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.9065 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.05972 |
| scoring_system |
epss |
| scoring_elements |
0.90656 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2670 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2670, GHSA-3x7h-5hfr-hvjm
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9zut-79gt-1bgy |
|
| 17 |
| url |
VCID-ay2f-3xcv-dqdc |
| vulnerability_id |
VCID-ay2f-3xcv-dqdc |
| summary |
Improper Neutralization of CRLF Sequences in HTTP Headers
CRLF injection vulnerability in the Undertow web server allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4993 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.81022 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80935 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.8096 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80967 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80984 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.8097 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80962 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80999 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.81 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80904 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.01476 |
| scoring_system |
epss |
| scoring_elements |
0.80913 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4993 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4993, GHSA-qcqr-hcjq-whfq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ay2f-3xcv-dqdc |
|
| 18 |
| url |
VCID-beaj-uk9m-17be |
| vulnerability_id |
VCID-beaj-uk9m-17be |
| summary |
Denial of service in Undertow
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-27782 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39641 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39928 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.3985 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39905 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39918 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39873 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39924 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39895 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39815 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39751 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.399 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-27782 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-27782, GHSA-rhcw-wjcm-9h6g
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-beaj-uk9m-17be |
|
| 19 |
| url |
VCID-bhrz-ea7j-k3bh |
| vulnerability_id |
VCID-bhrz-ea7j-k3bh |
| summary |
Information Exposure
An information exposure of plain text credentials through log files because `Connectors.executeRootHandler:402` logs the `HttpServerExchange` object at `ERROR` level using `UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t,exchange)`. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3888 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68879 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68775 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68753 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68804 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68846 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68831 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68802 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68843 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68853 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68736 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00577 |
| scoring_system |
epss |
| scoring_elements |
0.68755 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3888 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3888, GHSA-jwgx-9mmh-684w
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bhrz-ea7j-k3bh |
|
| 20 |
| url |
VCID-bm42-byxp-2kb5 |
| vulnerability_id |
VCID-bm42-byxp-2kb5 |
| summary |
In Undertow before versions 7.1.2.CR1, 7.1.2.GA it was found that the fix for CVE-2016-4993 was incomplete and Undertow web server is vulnerable to the injection of arbitrary HTTP headers, and also response splitting, due to insufficient sanitization and validation of user input before the input is used as part of an HTTP header value. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1067 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70274 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70198 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70221 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70206 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70193 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70234 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70243 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70222 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70128 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70141 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70157 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70134 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00626 |
| scoring_system |
epss |
| scoring_elements |
0.70182 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1067 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-1067 |
| reference_id |
CVE-2018-1067 |
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
5.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-1067 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1067, GHSA-47mp-rq2x-wjf2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bm42-byxp-2kb5 |
|
| 21 |
| url |
VCID-bpuw-kn4r-6kau |
| vulnerability_id |
VCID-bpuw-kn4r-6kau |
| summary |
HTTP request smuggling in Undertow
A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. The highest threat from this vulnerability is to data confidentiality and integrity. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20220 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39632 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39843 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39898 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39911 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39921 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39886 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39866 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39916 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39887 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39807 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39744 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39892 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.3992 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20220 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20220, GHSA-qjwc-v72v-fq6r
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bpuw-kn4r-6kau |
|
| 22 |
| url |
VCID-brsa-ygcs-wudx |
| vulnerability_id |
VCID-brsa-ygcs-wudx |
| summary |
Undertow Denial of Service vulnerability
A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected `0\r\n` termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:4392 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:4392 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:4884 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:4884 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:5143 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:5143 |
|
| 3 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:5144 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:5144 |
|
| 4 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:5145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:5145 |
|
| 5 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:5147 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:5147 |
|
| 6 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:6508 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:6508 |
|
| 7 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:6883 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:6883 |
|
| 8 |
|
| 9 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-5971 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-5971 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-5971 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87981 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87904 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87917 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87921 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87941 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87948 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87959 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87951 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.8795 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87965 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.03699 |
| scoring_system |
epss |
| scoring_elements |
0.87964 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-5971 |
|
| 11 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2292211 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T14:48:10Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2292211 |
|
| 12 |
| reference_url |
https://github.com/undertow-io/undertow |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/undertow-io/undertow |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-5971, GHSA-xpp6-8r3j-ww43
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-brsa-ygcs-wudx |
|
| 23 |
| url |
VCID-bsd5-k44s-buhu |
| vulnerability_id |
VCID-bsd5-k44s-buhu |
| summary |
Undertow Missing Release of Memory after Effective Lifetime vulnerability
A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:4392 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T21:35:33Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:4392 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:5143 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T21:35:33Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:5143 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:5144 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T21:35:33Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:5144 |
|
| 3 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:5145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T21:35:33Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:5145 |
|
| 4 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:5147 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T21:35:33Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:5147 |
|
| 5 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:6437 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T21:35:33Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:6437 |
|
| 6 |
|
| 7 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-3653 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T21:35:33Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-3653 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-3653 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89063 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.88991 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89006 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89009 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89027 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89032 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89044 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.8904 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89037 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89051 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.8905 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.04428 |
| scoring_system |
epss |
| scoring_elements |
0.89046 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-3653 |
|
| 9 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2274437 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-09T21:35:33Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2274437 |
|
| 10 |
| reference_url |
https://github.com/undertow-io/undertow |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/undertow-io/undertow |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-3653, GHSA-ch7q-gpff-h9hp
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bsd5-k44s-buhu |
|
| 24 |
| url |
VCID-cf5j-2dz8-7bbu |
| vulnerability_id |
VCID-cf5j-2dz8-7bbu |
| summary |
Undertow vulnerable to Denial of Service (DoS) attacks
Undertow client side invocation timeout raised when calling over HTTP2, this vulnerability can allow attacker to carry out denial of service (DoS) attacks in versions less than 2.2.15 Final. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3859 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54157 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54115 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54135 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54154 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54104 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54106 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54103 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54138 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54054 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.5408 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54051 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00309 |
| scoring_system |
epss |
| scoring_elements |
0.54034 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3859 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3859, GHSA-339q-62wm-c39w, GMS-2022-2963
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cf5j-2dz8-7bbu |
|
| 25 |
| url |
VCID-d3ty-z2dg-vka1 |
| vulnerability_id |
VCID-d3ty-z2dg-vka1 |
| summary |
Undertow incorrectly parses cookies
A flaw was found in Undertow, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4639 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05558 |
| scoring_system |
epss |
| scoring_elements |
0.90238 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.05558 |
| scoring_system |
epss |
| scoring_elements |
0.90251 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.05558 |
| scoring_system |
epss |
| scoring_elements |
0.90255 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0736 |
| scoring_system |
epss |
| scoring_elements |
0.91734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.0736 |
| scoring_system |
epss |
| scoring_elements |
0.91713 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0736 |
| scoring_system |
epss |
| scoring_elements |
0.91717 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0736 |
| scoring_system |
epss |
| scoring_elements |
0.91715 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0736 |
| scoring_system |
epss |
| scoring_elements |
0.91711 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0736 |
| scoring_system |
epss |
| scoring_elements |
0.91704 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0736 |
| scoring_system |
epss |
| scoring_elements |
0.91733 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.0736 |
| scoring_system |
epss |
| scoring_elements |
0.91728 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0736 |
| scoring_system |
epss |
| scoring_elements |
0.91726 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4639 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4639, GHSA-3jrv-jgp8-45v3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3ty-z2dg-vka1 |
|
| 26 |
| url |
VCID-df16-86dz-nfc9 |
| vulnerability_id |
VCID-df16-86dz-nfc9 |
| summary |
Undertow's url-encoded request path information can be broken on ajp-listener
A vulnerability was found in Undertow, where URL-encoded request paths can be mishandled during concurrent requests on the AJP listener. This issue arises because the same buffer is used to decode the paths for multiple requests simultaneously, leading to incorrect path information being processed. As a result, the server may attempt to access the wrong path, causing errors such as "404 Not Found" or other application failures. This flaw can potentially lead to a denial of service, as legitimate resources become inaccessible due to the path mix-up. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:1194 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-20T16:12:01Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:1194 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:4386 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-20T16:12:01Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:4386 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:4884 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-20T16:12:01Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:4884 |
|
| 3 |
|
| 4 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-6162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-20T16:12:01Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-6162 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83785 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83722 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83779 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83775 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83809 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.8381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83811 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83739 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83835 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83769 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83763 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.02024 |
| scoring_system |
epss |
| scoring_elements |
0.83736 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6162 |
|
| 6 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2293069 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-20T16:12:01Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2293069 |
|
| 7 |
| reference_url |
https://github.com/undertow-io/undertow |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/undertow-io/undertow |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://issues.redhat.com/browse/JBEAP-26268 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-20T16:12:01Z/ |
|
|
| url |
https://issues.redhat.com/browse/JBEAP-26268 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-6162, GHSA-9442-gm4v-r222
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-df16-86dz-nfc9 |
|
| 27 |
| url |
VCID-dvxb-wu3m-xuaz |
| vulnerability_id |
VCID-dvxb-wu3m-xuaz |
| summary |
Improper Authorization in Undertoe
A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1745 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70495 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70362 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70379 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70358 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70403 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70418 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70442 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70428 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70455 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70464 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.70444 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00636 |
| scoring_system |
epss |
| scoring_elements |
0.7035 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1745 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-1745, GHSA-gv2w-88hx-8m9r
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dvxb-wu3m-xuaz |
|
| 28 |
| url |
VCID-gsr8-1dea-effx |
| vulnerability_id |
VCID-gsr8-1dea-effx |
| summary |
undertow Race Condition vulnerability
A flaw was found in undertow. The HTTP2SourceChannel fails to write the final frame under some circumstances, resulting in a denial of service. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.35.SP1, prior to 2.2.6.SP1, prior to 2.2.7.SP1, prior to 2.0.36.SP1, prior to 2.2.9.Final and prior to 2.0.39.Final. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3597 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.37903 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38138 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38188 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38196 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38215 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38179 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38155 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38201 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38183 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38118 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38066 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38246 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38269 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3597 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3597, GHSA-mfhv-gwf8-4m88
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gsr8-1dea-effx |
|
| 29 |
| url |
VCID-hbg1-zqn4-hqcm |
| vulnerability_id |
VCID-hbg1-zqn4-hqcm |
| summary |
Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19343 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66182 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66223 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66249 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66219 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66267 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66281 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66301 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66288 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66257 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66291 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66307 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66292 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66316 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19343 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-19343
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hbg1-zqn4-hqcm |
|
| 30 |
| url |
VCID-jz3d-vvfb-jfbw |
| vulnerability_id |
VCID-jz3d-vvfb-jfbw |
| summary |
Undertow client not checking server identity presented by server certificate in https connections
The undertow client is not checking the server identity presented by the server certificate in https connections. This should be performed by default in https and in http/2. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4492 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36237 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.35956 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36188 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.3624 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36256 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36333 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36213 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36366 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36251 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36269 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36274 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4492 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-4492, GHSA-pfcc-3g6r-8rg8
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jz3d-vvfb-jfbw |
|
| 31 |
| url |
VCID-k6c9-mckm-cyhy |
| vulnerability_id |
VCID-k6c9-mckm-cyhy |
| summary |
HTTP Request Smuggling in Undertow
A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10719 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37546 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37854 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37867 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37881 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37845 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.3782 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37847 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37784 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37719 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.379 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37926 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37803 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10719 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10719, GHSA-cccf-7xw3-p2vr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k6c9-mckm-cyhy |
|
| 32 |
| url |
VCID-ns3p-22xg-q3bz |
| vulnerability_id |
VCID-ns3p-22xg-q3bz |
| summary |
Undertow MadeYouReset HTTP/2 DDoS Vulnerability
A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS). |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9784 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81488 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81371 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81394 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81392 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.8142 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81426 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81447 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81435 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81427 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81464 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81466 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01553 |
| scoring_system |
epss |
| scoring_elements |
0.81467 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9784 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
| reference_url |
https://kb.cert.org/vuls/id/767506 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-02T13:55:22Z/ |
|
|
| url |
https://kb.cert.org/vuls/id/767506 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-9784, GHSA-95h4-w6j8-2rp8
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ns3p-22xg-q3bz |
|
| 33 |
| url |
VCID-ntaz-sckf-mubx |
| vulnerability_id |
VCID-ntaz-sckf-mubx |
| summary |
Information disclosure via directory traversal
Directory traversal vulnerability in this package when running on Windows, allows remote attackers to read arbitrary files via a `..` in a resource URI. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7816 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98052 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.9805 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98065 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98063 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98042 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98062 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.55155 |
| scoring_system |
epss |
| scoring_elements |
0.98057 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7816 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-7816, GHSA-h6p6-fc4w-cqhx
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ntaz-sckf-mubx |
|
| 34 |
| url |
VCID-p9y4-yce4-zqbk |
| vulnerability_id |
VCID-p9y4-yce4-zqbk |
| summary |
Undertow vulnerable to Uncontrolled Resource Consumption
A vulnerability was found in the Undertow HTTP server in versions before 2.0.29 when listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14888 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46448 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46463 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46486 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46457 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46467 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46524 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46521 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46466 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46398 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46438 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46458 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46407 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14888 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-14888, GHSA-vjxc-frw4-jmh5
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p9y4-yce4-zqbk |
|
| 35 |
| url |
VCID-rqvc-k1jm-9kg9 |
| vulnerability_id |
VCID-rqvc-k1jm-9kg9 |
| summary |
Information Exposure
An information leak vulnerability was found in Undertow. If all headers are not written out in the first `write()` call, the code that handles flushing the buffer will always write out the full contents of the `writevBuffer` buffer, which may contain data from previous requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14642 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72268 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72194 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72216 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.722 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72229 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72238 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72224 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72167 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72145 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72182 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73006 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73015 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14642 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14642, GHSA-vf6r-mmhc-3xcm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rqvc-k1jm-9kg9 |
|
| 36 |
| url |
VCID-scjb-1mwk-rfdd |
| vulnerability_id |
VCID-scjb-1mwk-rfdd |
| summary |
Potential to access user credentials from the log files when debug logging enabled
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10212 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.6339 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63337 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63424 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63425 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.6346 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00445 |
| scoring_system |
epss |
| scoring_elements |
0.63459 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00448 |
| scoring_system |
epss |
| scoring_elements |
0.63586 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00448 |
| scoring_system |
epss |
| scoring_elements |
0.63576 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00448 |
| scoring_system |
epss |
| scoring_elements |
0.63584 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00448 |
| scoring_system |
epss |
| scoring_elements |
0.63567 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10212 |
|
| 4 |
|
| 5 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10212 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
4.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10212 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10212, GHSA-8vh8-vc28-m2hf
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-scjb-1mwk-rfdd |
|
| 37 |
| url |
VCID-sxup-wzjc-tue1 |
| vulnerability_id |
VCID-sxup-wzjc-tue1 |
| summary |
Improper Input Validation in Undertow
A flaw was found in all undertow-2.x.x SP1 versions prior to undertow-2.0.30.SP1, all undertow-1.x.x and undertow-2.x.x versions prior to undertow-2.1.0.Final, where the Servlet container causes servletPath to normalize incorrectly by truncating the path after semicolon which may lead to an application mapping resulting in the security bypass. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1757 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64358 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64331 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64302 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64337 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64347 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64338 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64223 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64281 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.6431 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64266 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64315 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64329 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00463 |
| scoring_system |
epss |
| scoring_elements |
0.64342 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1757 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-1757, GHSA-2w73-fqqj-c92p
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sxup-wzjc-tue1 |
|
| 38 |
| url |
VCID-urxh-sp91-kuet |
| vulnerability_id |
VCID-urxh-sp91-kuet |
| summary |
Allocation of Resources Without Limits or Throttling in Undertow
A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10705 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53264 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.5325 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53301 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53286 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53269 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53307 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53312 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53292 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53186 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53209 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53234 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53202 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00299 |
| scoring_system |
epss |
| scoring_elements |
0.53254 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10705 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10705, GHSA-g4cp-h53p-v3v8
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-urxh-sp91-kuet |
|
| 39 |
| url |
VCID-usz2-tufg-k7gz |
| vulnerability_id |
VCID-usz2-tufg-k7gz |
| summary |
Undertow denial of service vulnerability
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1108 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68582 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68457 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68476 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68452 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68503 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.6852 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68546 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68534 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68502 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68542 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68555 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00567 |
| scoring_system |
epss |
| scoring_elements |
0.68533 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1108 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
| reference_url |
https://github.com/advisories/GHSA-m4mm-pg93-fv78 |
| reference_id |
GHSA-m4mm-pg93-fv78 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
HIGH |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:37:50Z/ |
|
|
| url |
https://github.com/advisories/GHSA-m4mm-pg93-fv78 |
|
| 48 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-1108, GHSA-m4mm-pg93-fv78
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-usz2-tufg-k7gz |
|
| 40 |
| url |
VCID-xftw-raz7-b7e1 |
| vulnerability_id |
VCID-xftw-raz7-b7e1 |
| summary |
Undertow vulnerable to Dos via Large AJP request
When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) as an error state and not forward requests to the worker for a while. In mod_cluster, this continues until the next STATUS request (10 seconds intervals) from the application server updates the server state. So, in the worst case, it can result in "All workers are in error state" and mod_cluster responds "503 Service Unavailable" for a while (up to 10 seconds). In mod_proxy_balancer, it does not forward requests to the worker until the "retry" timeout passes. However, luckily, mod_proxy_balancer has "forcerecovery" setting (On by default; this parameter can force the immediate recovery of all workers without considering the retry parameter of the workers if all workers of a balancer are in error state.). So, unlike mod_cluster, mod_proxy_balancer does not result in responding "503 Service Unavailable". An attacker could use this behavior to send a malicious request and trigger server errors, resulting in DoS (denial of service). This flaw was fixed in Undertow 2.2.19.Final, Undertow 2.3.0.Alpha2. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53736 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53682 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53709 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53681 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53733 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53731 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.5378 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53763 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53747 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53784 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53788 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53771 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2053 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2053, GHSA-95rf-557x-44g5
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xftw-raz7-b7e1 |
|
| 41 |
| url |
VCID-xme8-usmd-vqg3 |
| vulnerability_id |
VCID-xme8-usmd-vqg3 |
| summary |
Undertow vulnerable to Race Condition
A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:11023 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:11023 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:6508 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:6508 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:6883 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:6883 |
|
| 3 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:7441 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:7441 |
|
| 4 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:7442 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:7442 |
|
| 5 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:7735 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:7735 |
|
| 6 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:7736 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:7736 |
|
| 7 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:8080 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:8080 |
|
| 8 |
| reference_url |
https://access.redhat.com/errata/RHSA-2025:16667 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2025:16667 |
|
| 9 |
| reference_url |
https://access.redhat.com/errata/RHSA-2026:0743 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2026:0743 |
|
| 10 |
|
| 11 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-7885 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-7885 |
|
| 12 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7885 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93355 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93299 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93305 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93304 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93312 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93317 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93321 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93319 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.9332 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93339 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.93343 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.10699 |
| scoring_system |
epss |
| scoring_elements |
0.9335 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7885 |
|
| 13 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2305290 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T15:21:22Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2305290 |
|
| 14 |
| reference_url |
https://github.com/undertow-io/undertow |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/undertow-io/undertow |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-7885, GHSA-9623-mqmm-5rcf
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xme8-usmd-vqg3 |
|
| 42 |
| url |
VCID-y5s2-w88t-8uhx |
| vulnerability_id |
VCID-y5s2-w88t-8uhx |
| summary |
Uncontrolled Resource Consumption
Remote attackers could cause a denial of service (CPU and disk consumption) via a long URL. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7046 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88552 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88473 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88481 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88498 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88501 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88519 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88524 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88536 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88528 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88542 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88538 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0406 |
| scoring_system |
epss |
| scoring_elements |
0.88535 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7046 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7046, GHSA-3f57-w2rp-72fc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y5s2-w88t-8uhx |
|
| 43 |
| url |
VCID-ygp7-kj2w-syat |
| vulnerability_id |
VCID-ygp7-kj2w-syat |
| summary |
Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling)
It was discovered that Undertow processes http request headers with unusual whitespaces which can cause possible http request smuggling. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12165 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.78063 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77946 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77953 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77982 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77963 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.7799 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.77995 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.78022 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.78005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.78003 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.78038 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.78037 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01096 |
| scoring_system |
epss |
| scoring_elements |
0.7803 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-12165 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-12165, GHSA-5gg7-5wv8-4gcj
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ygp7-kj2w-syat |
|
| 44 |
| url |
VCID-yn69-8upm-7yc2 |
| vulnerability_id |
VCID-yn69-8upm-7yc2 |
| summary |
Undertow Uncontrolled Resource Consumption
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3629 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52701 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52641 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52607 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52658 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52653 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52704 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52687 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52671 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.5271 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52717 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52571 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52615 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3629 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3629, GHSA-rf6q-vx79-mjxr
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yn69-8upm-7yc2 |
|