Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.hadoop/hadoop-common@3.0.0-alpha2
Typemaven
Namespaceorg.apache.hadoop
Namehadoop-common
Version3.0.0-alpha2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.4.0
Latest_non_vulnerable_version3.4.0
Affected_by_vulnerabilities
0
url VCID-3fz1-e6n6-rfh6
vulnerability_id VCID-3fz1-e6n6-rfh6
summary
Apache Hadoop: Temporary File Local Information Disclosure
Apache Hadoop’s `RunJar.run()` does not set permissions for temporary directory by default. If sensitive data will be present in this file, all the other local users may be able to view the content. This is because, on unix-like systems, the system temporary directory is shared between all local users. As such, files written in this directory, without setting the correct posix permissions explicitly, may be viewable by all other local users.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23454
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28493
published_at 2026-04-04T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.2779
published_at 2026-05-05T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.27953
published_at 2026-04-29T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28285
published_at 2026-04-18T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28306
published_at 2026-04-16T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28295
published_at 2026-04-13T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28353
published_at 2026-04-12T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28396
published_at 2026-04-11T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28393
published_at 2026-04-09T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.2835
published_at 2026-04-08T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28284
published_at 2026-04-07T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-02T12:55:00Z
12
value 0.00104
scoring_system epss
scoring_elements 0.28031
published_at 2026-04-26T12:55:00Z
13
value 0.00104
scoring_system epss
scoring_elements 0.28144
published_at 2026-04-24T12:55:00Z
14
value 0.00104
scoring_system epss
scoring_elements 0.28239
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23454
1
reference_url https://github.com/apache/hadoop
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/apache/hadoop
2
reference_url https://github.com/apache/hadoop/commit/8c2836402fbb2f619f1fef4ef625a8542e853a64
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/apache/hadoop/commit/8c2836402fbb2f619f1fef4ef625a8542e853a64
3
reference_url https://issues.apache.org/jira/browse/HADOOP-19031
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T15:19:22Z/
url https://issues.apache.org/jira/browse/HADOOP-19031
4
reference_url https://lists.apache.org/thread/xlo7q8kn4tsjvx059r789oz19hzgfkfs
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T15:19:22Z/
url https://lists.apache.org/thread/xlo7q8kn4tsjvx059r789oz19hzgfkfs
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-23454
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-23454
6
reference_url https://security.netapp.com/advisory/ntap-20241101-0002
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241101-0002
7
reference_url http://www.openwall.com/lists/oss-security/2024/09/25/1
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2024/09/25/1
8
reference_url https://github.com/advisories/GHSA-f5fw-25gw-5m92
reference_id GHSA-f5fw-25gw-5m92
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f5fw-25gw-5m92
fixed_packages
0
url pkg:maven/org.apache.hadoop/hadoop-common@3.4.0
purl pkg:maven/org.apache.hadoop/hadoop-common@3.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.4.0
aliases CVE-2024-23454, GHSA-f5fw-25gw-5m92
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fz1-e6n6-rfh6
1
url VCID-6fnh-mjwd-9qee
vulnerability_id VCID-6fnh-mjwd-9qee
summary
Privilege escalation
A user who can escalate to yarn user can possibly run arbitrary commands as root user.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8029.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8029.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8029
reference_id
reference_type
scores
0
value 0.02072
scoring_system epss
scoring_elements 0.84037
published_at 2026-05-05T12:55:00Z
1
value 0.02152
scoring_system epss
scoring_elements 0.84244
published_at 2026-04-09T12:55:00Z
2
value 0.02152
scoring_system epss
scoring_elements 0.84319
published_at 2026-04-29T12:55:00Z
3
value 0.02152
scoring_system epss
scoring_elements 0.84314
published_at 2026-04-26T12:55:00Z
4
value 0.02152
scoring_system epss
scoring_elements 0.84305
published_at 2026-04-24T12:55:00Z
5
value 0.02152
scoring_system epss
scoring_elements 0.84276
published_at 2026-04-16T12:55:00Z
6
value 0.02152
scoring_system epss
scoring_elements 0.84254
published_at 2026-04-13T12:55:00Z
7
value 0.02152
scoring_system epss
scoring_elements 0.84257
published_at 2026-04-12T12:55:00Z
8
value 0.02152
scoring_system epss
scoring_elements 0.84184
published_at 2026-04-01T12:55:00Z
9
value 0.02152
scoring_system epss
scoring_elements 0.84197
published_at 2026-04-02T12:55:00Z
10
value 0.02152
scoring_system epss
scoring_elements 0.84215
published_at 2026-04-04T12:55:00Z
11
value 0.02152
scoring_system epss
scoring_elements 0.84216
published_at 2026-04-07T12:55:00Z
12
value 0.02152
scoring_system epss
scoring_elements 0.84238
published_at 2026-04-08T12:55:00Z
13
value 0.02152
scoring_system epss
scoring_elements 0.84262
published_at 2026-04-11T12:55:00Z
14
value 0.02152
scoring_system epss
scoring_elements 0.84281
published_at 2026-04-21T12:55:00Z
15
value 0.02152
scoring_system epss
scoring_elements 0.84277
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029
3
reference_url https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E
4
reference_url https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E
9
reference_url https://security.netapp.com/advisory/ntap-20190617-0001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190617-0001
10
reference_url https://security.netapp.com/advisory/ntap-20190617-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190617-0001/
11
reference_url https://www.openwall.com/lists/oss-security/2019/05/30/1
reference_id
reference_type
scores
url https://www.openwall.com/lists/oss-security/2019/05/30/1
12
reference_url http://www.securityfocus.com/bid/108518
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/108518
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1795321
reference_id 1795321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1795321
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-8029
reference_id CVE-2018-8029
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-8029
15
reference_url https://github.com/advisories/GHSA-37pw-qw47-4jxm
reference_id GHSA-37pw-qw47-4jxm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-37pw-qw47-4jxm
fixed_packages
0
url pkg:maven/org.apache.hadoop/hadoop-common@3.1.1
purl pkg:maven/org.apache.hadoop/hadoop-common@3.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1h2m-ywk8-b7dm
1
vulnerability VCID-3fz1-e6n6-rfh6
2
vulnerability VCID-a8xd-ukj7-tqbk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.1.1
aliases CVE-2018-8029, GHSA-37pw-qw47-4jxm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fnh-mjwd-9qee
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.0.0-alpha2