Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-tbyy-yemg-g7bk
Summary
Apache James server's JMX management service vulnerable to privilege escalation by local user
Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.
Aliases
0
alias CVE-2023-26269
1
alias GHSA-w7r6-v4j7-h94w
Fixed_packages
0
url pkg:maven/org.apache.james/javax-mail-extension@3.7.4
purl pkg:maven/org.apache.james/javax-mail-extension@3.7.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.7.4
Affected_packages
0
url pkg:maven/org.apache.james/javax-mail-extension@3.1.0
purl pkg:maven/org.apache.james/javax-mail-extension@3.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.1.0
1
url pkg:maven/org.apache.james/javax-mail-extension@3.2.0
purl pkg:maven/org.apache.james/javax-mail-extension@3.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.2.0
2
url pkg:maven/org.apache.james/javax-mail-extension@3.3.0
purl pkg:maven/org.apache.james/javax-mail-extension@3.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.3.0
3
url pkg:maven/org.apache.james/javax-mail-extension@3.4.0
purl pkg:maven/org.apache.james/javax-mail-extension@3.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.4.0
4
url pkg:maven/org.apache.james/javax-mail-extension@3.5.0
purl pkg:maven/org.apache.james/javax-mail-extension@3.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.5.0
5
url pkg:maven/org.apache.james/javax-mail-extension@3.6.0
purl pkg:maven/org.apache.james/javax-mail-extension@3.6.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.6.0
6
url pkg:maven/org.apache.james/javax-mail-extension@3.6.2
purl pkg:maven/org.apache.james/javax-mail-extension@3.6.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.6.2
7
url pkg:maven/org.apache.james/javax-mail-extension@3.7.0
purl pkg:maven/org.apache.james/javax-mail-extension@3.7.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.7.0
8
url pkg:maven/org.apache.james/javax-mail-extension@3.7.1
purl pkg:maven/org.apache.james/javax-mail-extension@3.7.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.7.1
9
url pkg:maven/org.apache.james/javax-mail-extension@3.7.2
purl pkg:maven/org.apache.james/javax-mail-extension@3.7.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.7.2
10
url pkg:maven/org.apache.james/javax-mail-extension@3.7.3
purl pkg:maven/org.apache.james/javax-mail-extension@3.7.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tbyy-yemg-g7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/javax-mail-extension@3.7.3
11
url pkg:maven/org.jamesframework/james@0.1
purl pkg:maven/org.jamesframework/james@0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4q61-ksfc-aqf2
1
vulnerability VCID-4s4f-emvn-9bhh
2
vulnerability VCID-aqre-33na-w3d9
3
vulnerability VCID-gcxw-t4m6-4bcs
4
vulnerability VCID-k6dw-17nc-xbd5
5
vulnerability VCID-tbyy-yemg-g7bk
6
vulnerability VCID-vv9x-5ab5-yfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jamesframework/james@0.1
12
url pkg:maven/org.jamesframework/james@0.2
purl pkg:maven/org.jamesframework/james@0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4q61-ksfc-aqf2
1
vulnerability VCID-4s4f-emvn-9bhh
2
vulnerability VCID-aqre-33na-w3d9
3
vulnerability VCID-gcxw-t4m6-4bcs
4
vulnerability VCID-k6dw-17nc-xbd5
5
vulnerability VCID-tbyy-yemg-g7bk
6
vulnerability VCID-vv9x-5ab5-yfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jamesframework/james@0.2
13
url pkg:maven/org.jamesframework/james@1.1
purl pkg:maven/org.jamesframework/james@1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4q61-ksfc-aqf2
1
vulnerability VCID-aqre-33na-w3d9
2
vulnerability VCID-gcxw-t4m6-4bcs
3
vulnerability VCID-k6dw-17nc-xbd5
4
vulnerability VCID-tbyy-yemg-g7bk
5
vulnerability VCID-vv9x-5ab5-yfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jamesframework/james@1.1
14
url pkg:maven/org.jamesframework/james@1.2
purl pkg:maven/org.jamesframework/james@1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4q61-ksfc-aqf2
1
vulnerability VCID-aqre-33na-w3d9
2
vulnerability VCID-gcxw-t4m6-4bcs
3
vulnerability VCID-k6dw-17nc-xbd5
4
vulnerability VCID-tbyy-yemg-g7bk
5
vulnerability VCID-vv9x-5ab5-yfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jamesframework/james@1.2
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-26269
reference_id
reference_type
scores
0
value 0.01004
scoring_system epss
scoring_elements 0.76976
published_at 2026-04-07T12:55:00Z
1
value 0.01004
scoring_system epss
scoring_elements 0.77026
published_at 2026-04-12T12:55:00Z
2
value 0.01004
scoring_system epss
scoring_elements 0.77047
published_at 2026-04-11T12:55:00Z
3
value 0.01004
scoring_system epss
scoring_elements 0.77019
published_at 2026-04-09T12:55:00Z
4
value 0.01004
scoring_system epss
scoring_elements 0.76994
published_at 2026-04-04T12:55:00Z
5
value 0.01004
scoring_system epss
scoring_elements 0.77008
published_at 2026-04-08T12:55:00Z
6
value 0.01004
scoring_system epss
scoring_elements 0.77064
published_at 2026-04-18T12:55:00Z
7
value 0.01004
scoring_system epss
scoring_elements 0.77063
published_at 2026-04-16T12:55:00Z
8
value 0.01004
scoring_system epss
scoring_elements 0.77022
published_at 2026-04-13T12:55:00Z
9
value 0.01039
scoring_system epss
scoring_elements 0.77368
published_at 2026-04-02T12:55:00Z
10
value 0.01164
scoring_system epss
scoring_elements 0.78673
published_at 2026-04-24T12:55:00Z
11
value 0.01164
scoring_system epss
scoring_elements 0.78642
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-26269
1
reference_url https://github.com/apache/james-project
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/james-project
2
reference_url https://lists.apache.org/thread/2z44rg93pflbjhvbwy3xtz505bx41cbs
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T15:09:13Z/
url https://lists.apache.org/thread/2z44rg93pflbjhvbwy3xtz505bx41cbs
3
reference_url http://www.openwall.com/lists/oss-security/2023/04/18/3
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T15:09:13Z/
url http://www.openwall.com/lists/oss-security/2023/04/18/3
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-26269
reference_id CVE-2023-26269
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-26269
5
reference_url https://github.com/advisories/GHSA-w7r6-v4j7-h94w
reference_id GHSA-w7r6-v4j7-h94w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w7r6-v4j7-h94w
Weaknesses
0
cwe_id 862
name Missing Authorization
description The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-tbyy-yemg-g7bk