Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.hadoop/hadoop-common@3.0.0-alpha1
Typemaven
Namespaceorg.apache.hadoop
Namehadoop-common
Version3.0.0-alpha1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.4.0
Latest_non_vulnerable_version3.4.0
Affected_by_vulnerabilities
0
url VCID-3fz1-e6n6-rfh6
vulnerability_id VCID-3fz1-e6n6-rfh6
summary
Apache Hadoop: Temporary File Local Information Disclosure
Apache Hadoop’s `RunJar.run()` does not set permissions for temporary directory by default. If sensitive data will be present in this file, all the other local users may be able to view the content. This is because, on unix-like systems, the system temporary directory is shared between all local users. As such, files written in this directory, without setting the correct posix permissions explicitly, may be viewable by all other local users.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23454
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-02T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.27816
published_at 2026-05-12T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.27798
published_at 2026-05-11T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28306
published_at 2026-04-16T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28295
published_at 2026-04-13T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28353
published_at 2026-04-12T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28396
published_at 2026-04-11T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28393
published_at 2026-04-09T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.2835
published_at 2026-04-08T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28284
published_at 2026-04-07T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28493
published_at 2026-04-04T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.27881
published_at 2026-05-09T12:55:00Z
12
value 0.00104
scoring_system epss
scoring_elements 0.27854
published_at 2026-05-07T12:55:00Z
13
value 0.00104
scoring_system epss
scoring_elements 0.2779
published_at 2026-05-05T12:55:00Z
14
value 0.00104
scoring_system epss
scoring_elements 0.27953
published_at 2026-04-29T12:55:00Z
15
value 0.00104
scoring_system epss
scoring_elements 0.28031
published_at 2026-04-26T12:55:00Z
16
value 0.00104
scoring_system epss
scoring_elements 0.28144
published_at 2026-04-24T12:55:00Z
17
value 0.00104
scoring_system epss
scoring_elements 0.28239
published_at 2026-04-21T12:55:00Z
18
value 0.00104
scoring_system epss
scoring_elements 0.28285
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23454
1
reference_url https://github.com/apache/hadoop
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/apache/hadoop
2
reference_url https://github.com/apache/hadoop/commit/8c2836402fbb2f619f1fef4ef625a8542e853a64
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/apache/hadoop/commit/8c2836402fbb2f619f1fef4ef625a8542e853a64
3
reference_url https://issues.apache.org/jira/browse/HADOOP-19031
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T15:19:22Z/
url https://issues.apache.org/jira/browse/HADOOP-19031
4
reference_url https://lists.apache.org/thread/xlo7q8kn4tsjvx059r789oz19hzgfkfs
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T15:19:22Z/
url https://lists.apache.org/thread/xlo7q8kn4tsjvx059r789oz19hzgfkfs
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-23454
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-23454
6
reference_url https://security.netapp.com/advisory/ntap-20241101-0002
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241101-0002
7
reference_url http://www.openwall.com/lists/oss-security/2024/09/25/1
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2024/09/25/1
8
reference_url https://github.com/advisories/GHSA-f5fw-25gw-5m92
reference_id GHSA-f5fw-25gw-5m92
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f5fw-25gw-5m92
fixed_packages
0
url pkg:maven/org.apache.hadoop/hadoop-common@3.4.0
purl pkg:maven/org.apache.hadoop/hadoop-common@3.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.4.0
aliases CVE-2024-23454, GHSA-f5fw-25gw-5m92
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fz1-e6n6-rfh6
1
url VCID-6fnh-mjwd-9qee
vulnerability_id VCID-6fnh-mjwd-9qee
summary
Privilege escalation
A user who can escalate to yarn user can possibly run arbitrary commands as root user.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8029.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8029.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8029
reference_id
reference_type
scores
0
value 0.02072
scoring_system epss
scoring_elements 0.84092
published_at 2026-05-12T12:55:00Z
1
value 0.02072
scoring_system epss
scoring_elements 0.84075
published_at 2026-05-11T12:55:00Z
2
value 0.02072
scoring_system epss
scoring_elements 0.84076
published_at 2026-05-09T12:55:00Z
3
value 0.02072
scoring_system epss
scoring_elements 0.8406
published_at 2026-05-07T12:55:00Z
4
value 0.02072
scoring_system epss
scoring_elements 0.84037
published_at 2026-05-05T12:55:00Z
5
value 0.02152
scoring_system epss
scoring_elements 0.84184
published_at 2026-04-01T12:55:00Z
6
value 0.02152
scoring_system epss
scoring_elements 0.84197
published_at 2026-04-02T12:55:00Z
7
value 0.02152
scoring_system epss
scoring_elements 0.84215
published_at 2026-04-04T12:55:00Z
8
value 0.02152
scoring_system epss
scoring_elements 0.84216
published_at 2026-04-07T12:55:00Z
9
value 0.02152
scoring_system epss
scoring_elements 0.84238
published_at 2026-04-08T12:55:00Z
10
value 0.02152
scoring_system epss
scoring_elements 0.84244
published_at 2026-04-09T12:55:00Z
11
value 0.02152
scoring_system epss
scoring_elements 0.84262
published_at 2026-04-11T12:55:00Z
12
value 0.02152
scoring_system epss
scoring_elements 0.84257
published_at 2026-04-12T12:55:00Z
13
value 0.02152
scoring_system epss
scoring_elements 0.84254
published_at 2026-04-13T12:55:00Z
14
value 0.02152
scoring_system epss
scoring_elements 0.84276
published_at 2026-04-16T12:55:00Z
15
value 0.02152
scoring_system epss
scoring_elements 0.84277
published_at 2026-04-18T12:55:00Z
16
value 0.02152
scoring_system epss
scoring_elements 0.84281
published_at 2026-04-21T12:55:00Z
17
value 0.02152
scoring_system epss
scoring_elements 0.84305
published_at 2026-04-24T12:55:00Z
18
value 0.02152
scoring_system epss
scoring_elements 0.84314
published_at 2026-04-26T12:55:00Z
19
value 0.02152
scoring_system epss
scoring_elements 0.84319
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029
3
reference_url https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E
4
reference_url https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E
9
reference_url https://security.netapp.com/advisory/ntap-20190617-0001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190617-0001
10
reference_url https://security.netapp.com/advisory/ntap-20190617-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190617-0001/
11
reference_url https://www.openwall.com/lists/oss-security/2019/05/30/1
reference_id
reference_type
scores
url https://www.openwall.com/lists/oss-security/2019/05/30/1
12
reference_url http://www.securityfocus.com/bid/108518
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/108518
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1795321
reference_id 1795321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1795321
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-8029
reference_id CVE-2018-8029
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-8029
15
reference_url https://github.com/advisories/GHSA-37pw-qw47-4jxm
reference_id GHSA-37pw-qw47-4jxm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-37pw-qw47-4jxm
fixed_packages
0
url pkg:maven/org.apache.hadoop/hadoop-common@3.1.1
purl pkg:maven/org.apache.hadoop/hadoop-common@3.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1h2m-ywk8-b7dm
1
vulnerability VCID-3fz1-e6n6-rfh6
2
vulnerability VCID-a8xd-ukj7-tqbk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.1.1
aliases CVE-2018-8029, GHSA-37pw-qw47-4jxm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fnh-mjwd-9qee
2
url VCID-ncuc-8grw-ubep
vulnerability_id VCID-ncuc-8grw-ubep
summary In Apache Hadoop 2.8.0, 3.0.0-alpha1, and 3.0.0-alpha2, the LinuxContainerExecutor runs docker commands as root with insufficient input validation. When the docker feature is enabled, authenticated users can run commands as root.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7669
reference_id
reference_type
scores
0
value 0.00298
scoring_system epss
scoring_elements 0.53161
published_at 2026-05-11T12:55:00Z
1
value 0.00298
scoring_system epss
scoring_elements 0.53218
published_at 2026-04-18T12:55:00Z
2
value 0.00298
scoring_system epss
scoring_elements 0.532
published_at 2026-04-21T12:55:00Z
3
value 0.00298
scoring_system epss
scoring_elements 0.53174
published_at 2026-04-24T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53186
published_at 2026-04-26T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53148
published_at 2026-04-29T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.53102
published_at 2026-05-05T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.53195
published_at 2026-05-09T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53097
published_at 2026-04-01T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53117
published_at 2026-04-02T12:55:00Z
10
value 0.00298
scoring_system epss
scoring_elements 0.5314
published_at 2026-04-04T12:55:00Z
11
value 0.00298
scoring_system epss
scoring_elements 0.53108
published_at 2026-04-07T12:55:00Z
12
value 0.00298
scoring_system epss
scoring_elements 0.53159
published_at 2026-04-08T12:55:00Z
13
value 0.00298
scoring_system epss
scoring_elements 0.53152
published_at 2026-05-07T12:55:00Z
14
value 0.00298
scoring_system epss
scoring_elements 0.53202
published_at 2026-04-11T12:55:00Z
15
value 0.00298
scoring_system epss
scoring_elements 0.53187
published_at 2026-05-12T12:55:00Z
16
value 0.00298
scoring_system epss
scoring_elements 0.53171
published_at 2026-04-13T12:55:00Z
17
value 0.00298
scoring_system epss
scoring_elements 0.53211
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7669
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1448373
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1448373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7669
3
reference_url http://seclists.org/oss-sec/2017/q2/394
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2017/q2/394
4
reference_url https://github.com/apache/hadoop/commit/0319e74c2512d47d47ab9df834f5b6455be7d968
reference_id
reference_type
scores
url https://github.com/apache/hadoop/commit/0319e74c2512d47d47ab9df834f5b6455be7d968
5
reference_url https://github.com/apache/hadoop/commit/bbe3b0857d383c5e4dc4a7ade90a88a3e24338b
reference_id
reference_type
scores
url https://github.com/apache/hadoop/commit/bbe3b0857d383c5e4dc4a7ade90a88a3e24338b
6
reference_url https://mail-archives.apache.org/mod_mbox/hadoop-user/201706.mbox/%3C4A2FDA56-491B-4C2A-915F-C9D4A4BDB92A%40apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://mail-archives.apache.org/mod_mbox/hadoop-user/201706.mbox/%3C4A2FDA56-491B-4C2A-915F-C9D4A4BDB92A%40apache.org%3E
7
reference_url http://www.securityfocus.com/bid/98795
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/98795
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7669
reference_id CVE-2017-7669
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-7669
9
reference_url https://github.com/advisories/GHSA-h24p-qwf4-84q8
reference_id GHSA-h24p-qwf4-84q8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h24p-qwf4-84q8
fixed_packages
0
url pkg:maven/org.apache.hadoop/hadoop-common@3.0.0-alpha3
purl pkg:maven/org.apache.hadoop/hadoop-common@3.0.0-alpha3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fz1-e6n6-rfh6
1
vulnerability VCID-6fnh-mjwd-9qee
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.0.0-alpha3
1
url pkg:maven/org.apache.hadoop/hadoop-common@3.0.1
purl pkg:maven/org.apache.hadoop/hadoop-common@3.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1h2m-ywk8-b7dm
1
vulnerability VCID-3fz1-e6n6-rfh6
2
vulnerability VCID-6fnh-mjwd-9qee
3
vulnerability VCID-a8xd-ukj7-tqbk
4
vulnerability VCID-p5ab-z4u4-akcv
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.0.1
aliases CVE-2017-7669, GHSA-h24p-qwf4-84q8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ncuc-8grw-ubep
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.0.0-alpha1