{"url":"http://public2.vulnerablecode.io/api/packages/51580?format=json","purl":"pkg:maven/io.netty/netty@3.8","type":"maven","namespace":"io.netty","name":"netty","version":"3.8","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4922?format=json","vulnerability_id":"VCID-2khv-6pu7-akga","summary":"WebSocket08FrameDecoder in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames.","references":[{"reference_url":"http://netty.io/news/2014/04/30/release-day.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://netty.io/news/2014/04/30/release-day.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1019.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1019.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1020.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1020.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1021.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1021.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1351.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1351.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0675.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0720.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0720.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0765.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0765.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0193.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0193","reference_id":"","reference_type":"","scores":[{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88655","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88547","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88589","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88605","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88616","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88628","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.8852","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88543","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88555","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0193"},{"reference_url":"https://github.com/netty/netty","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/netty/netty"},{"reference_url":"https://github.com/netty/netty/commit/8599ab5bdb761bb99d41a975d689f74c12e4892b","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/netty/netty/commit/8599ab5bdb761bb99d41a975d689f74c12e4892b"},{"reference_url":"https://github.com/netty/netty/issues/2441","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/netty/netty/issues/2441"},{"reference_url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html"},{"reference_url":"https://web.archive.org/web/20140509033427/http://www.securityfocus.com/bid/67182","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20140509033427/http://www.securityfocus.com/bid/67182"},{"reference_url":"https://web.archive.org/web/20140509044857/http://secunia.com/advisories/58280","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20140509044857/http://secunia.com/advisories/58280"},{"reference_url":"https://web.archive.org/web/20161119201425/http://secunia.com/advisories/59290","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20161119201425/http://secunia.com/advisories/59290"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092783","reference_id":"1092783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1092783"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0193","reference_id":"CVE-2014-0193","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0193"},{"reference_url":"https://github.com/advisories/GHSA-7vpq-g998-qpv7","reference_id":"GHSA-7vpq-g998-qpv7","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-7vpq-g998-qpv7"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0818","reference_id":"RHSA-2014:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0910","reference_id":"RHSA-2014:0910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1019","reference_id":"RHSA-2014:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1020","reference_id":"RHSA-2014:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1021","reference_id":"RHSA-2014:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1351","reference_id":"RHSA-2014:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0234","reference_id":"RHSA-2015:0234","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0235","reference_id":"RHSA-2015:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0675","reference_id":"RHSA-2015:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0720","reference_id":"RHSA-2015:0720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0765","reference_id":"RHSA-2015:0765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1009","reference_id":"RHSA-2015:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1009"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/51585?format=json","purl":"pkg:maven/io.netty/netty@3.8.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty@3.8.2"},{"url":"http://public2.vulnerablecode.io/api/packages/83942?format=json","purl":"pkg:maven/io.netty/netty@3.8.2.Final","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3mgs-vrus-q3ag"},{"vulnerability":"VCID-81nf-zd3k-mud7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty@3.8.2.Final"},{"url":"http://public2.vulnerablecode.io/api/packages/20757?format=json","purl":"pkg:maven/io.netty/netty@3.9.1.Final","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3mgs-vrus-q3ag"},{"vulnerability":"VCID-81nf-zd3k-mud7"},{"vulnerability":"VCID-dtrw-kqd2-duce"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty@3.9.1.Final"},{"url":"http://public2.vulnerablecode.io/api/packages/51586?format=json","purl":"pkg:maven/io.netty/netty@3.9.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty@3.9.1"},{"url":"http://public2.vulnerablecode.io/api/packages/83943?format=json","purl":"pkg:maven/io.netty/netty@4.0.19.Final","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty@4.0.19.Final"},{"url":"http://public2.vulnerablecode.io/api/packages/51587?format=json","purl":"pkg:maven/io.netty/netty@4.0.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty@4.0.19"}],"aliases":["CVE-2014-0193","GHSA-7vpq-g998-qpv7"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2khv-6pu7-akga"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty@3.8"}