{"url":"http://public2.vulnerablecode.io/api/packages/52200?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.6.3","type":"maven","namespace":"org.apache.hadoop","name":"hadoop-common","version":"2.6.3","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"3.4.0","latest_non_vulnerable_version":"3.4.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54122?format=json","vulnerability_id":"VCID-1h2m-ywk8-b7dm","summary":"Apache Hadoop heap overflow before v2.10.2, v3.2.3, v3.3.2\nThere is a potential heap buffer overflow in Apache Hadoop libhdfs native code. Opening a file path provided by user without validation may result in a denial of service or arbitrary code execution. Users should upgrade to Apache Hadoop 2.10.2, 3.2.3, 3.3.2 or higher.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37404.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37404.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37404","reference_id":"","reference_type":"","scores":[{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77812","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77803","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77758","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77682","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77689","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77716","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80887","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37404"},{"reference_url":"https://github.com/apache/hadoop","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop"},{"reference_url":"https://lists.apache.org/thread/2h56ztcj3ojc66qzf1nno88vjw9vd4wo","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread/2h56ztcj3ojc66qzf1nno88vjw9vd4wo"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37404","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37404"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220715-0007","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20220715-0007"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220715-0007/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20220715-0007/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2097421","reference_id":"2097421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2097421"},{"reference_url":"https://github.com/advisories/GHSA-rmpj-7c96-mrg8","reference_id":"GHSA-rmpj-7c96-mrg8","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-rmpj-7c96-mrg8"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/48648?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.10.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3fz1-e6n6-rfh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.10.2"},{"url":"http://public2.vulnerablecode.io/api/packages/48645?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@3.2.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.2.3"},{"url":"http://public2.vulnerablecode.io/api/packages/81550?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@3.3.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.3.2"}],"aliases":["CVE-2021-37404","GHSA-rmpj-7c96-mrg8"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1h2m-ywk8-b7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/13625?format=json","vulnerability_id":"VCID-3fz1-e6n6-rfh6","summary":"Apache Hadoop: Temporary File Local Information Disclosure\nApache Hadoop’s `RunJar.run()` does not set permissions for temporary directory by default. If sensitive data will be present in this file, all the other local users may be able to view the content. This is because, on unix-like systems, the system temporary directory is shared between all local users. As such, files written in this directory, without setting the correct posix permissions explicitly, may be viewable by all other local users.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23454","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28393","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27953","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28031","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28144","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28239","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28284","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2835","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28396","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23454"},{"reference_url":"https://github.com/apache/hadoop","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop"},{"reference_url":"https://github.com/apache/hadoop/commit/8c2836402fbb2f619f1fef4ef625a8542e853a64","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop/commit/8c2836402fbb2f619f1fef4ef625a8542e853a64"},{"reference_url":"https://issues.apache.org/jira/browse/HADOOP-19031","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T15:19:22Z/"}],"url":"https://issues.apache.org/jira/browse/HADOOP-19031"},{"reference_url":"https://lists.apache.org/thread/xlo7q8kn4tsjvx059r789oz19hzgfkfs","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T15:19:22Z/"}],"url":"https://lists.apache.org/thread/xlo7q8kn4tsjvx059r789oz19hzgfkfs"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23454","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23454"},{"reference_url":"https://security.netapp.com/advisory/ntap-20241101-0002","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20241101-0002"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/09/25/1","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"2.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2024/09/25/1"},{"reference_url":"https://github.com/advisories/GHSA-f5fw-25gw-5m92","reference_id":"GHSA-f5fw-25gw-5m92","reference_type":"","scores":[{"value":"LOW","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-f5fw-25gw-5m92"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/48522?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@3.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.4.0"}],"aliases":["CVE-2024-23454","GHSA-f5fw-25gw-5m92"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3fz1-e6n6-rfh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/14868?format=json","vulnerability_id":"VCID-5a9g-vebh-67cq","summary":"Exposure of Sensitive Information to an Unauthorized Actor\nThis is an information disclosure vulnerability in Apache Hadoop before 2.6.4 and 2.7.x before 2.7.2 in the short-circuit reads feature of HDFS. A local user on an HDFS DataNode may be able to craft a block token that grants unauthorized read access to random files by guessing certain fields in the token.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5001","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30242","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30669","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30618","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30324","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30774","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30822","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30734","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5001"},{"reference_url":"http://seclists.org/oss-sec/2016/q4/698","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/oss-sec/2016/q4/698"},{"reference_url":"https://lists.apache.org/thread.html/r66de86b9a608c1da70b2d27d765c11ec88edf6e5dd6f379ab33e072a@%3Cuser.flink.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r66de86b9a608c1da70b2d27d765c11ec88edf6e5dd6f379ab33e072a@%3Cuser.flink.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5001","reference_id":"CVE-2016-5001","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5001"},{"reference_url":"https://github.com/advisories/GHSA-8r28-r8cp-g6cp","reference_id":"GHSA-8r28-r8cp-g6cp","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-8r28-r8cp-g6cp"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/52203?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.6.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-5k2f-qcuj-7yex"},{"vulnerability":"VCID-67cn-ebsg-zbdd"},{"vulnerability":"VCID-6fnh-mjwd-9qee"},{"vulnerability":"VCID-6ue7-puv7-wbcb"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"},{"vulnerability":"VCID-kt1w-97bw-r7bp"},{"vulnerability":"VCID-p5ab-z4u4-akcv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.6.4"},{"url":"http://public2.vulnerablecode.io/api/packages/52204?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.7.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-5k2f-qcuj-7yex"},{"vulnerability":"VCID-67cn-ebsg-zbdd"},{"vulnerability":"VCID-6fnh-mjwd-9qee"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"},{"vulnerability":"VCID-kt1w-97bw-r7bp"},{"vulnerability":"VCID-p5ab-z4u4-akcv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.7.2"}],"aliases":["CVE-2016-5001","GHSA-8r28-r8cp-g6cp"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5a9g-vebh-67cq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56500?format=json","vulnerability_id":"VCID-5k2f-qcuj-7yex","summary":"Improper Access Control in Apache Hadoop\nIn Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3, a remote user who can authenticate with the HDFS NameNode can possibly run arbitrary commands with the same privileges as the HDFS service.","references":[{"reference_url":"http://mail-archives.apache.org/mod_mbox/hadoop-general/201611.mbox/%3CCAA0W1bTbUmUUSF1rjRpX-2DvWutcrPt7TJSWUcSLg1F0gyHG1Q%40mail.gmail.com%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://mail-archives.apache.org/mod_mbox/hadoop-general/201611.mbox/%3CCAA0W1bTbUmUUSF1rjRpX-2DvWutcrPt7TJSWUcSLg1F0gyHG1Q%40mail.gmail.com%3E"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5393","reference_id":"","reference_type":"","scores":[{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85635","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85605","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85623","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85634","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85506","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85535","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85539","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85559","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.8557","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85581","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02585","scoring_system":"epss","scoring_elements":"0.85577","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5393"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5393","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5393"},{"reference_url":"http://www.securityfocus.com/bid/94574","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/94574"},{"reference_url":"https://github.com/advisories/GHSA-7q56-mp4c-gggg","reference_id":"GHSA-7q56-mp4c-gggg","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-7q56-mp4c-gggg"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82451?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.6.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-67cn-ebsg-zbdd"},{"vulnerability":"VCID-6fnh-mjwd-9qee"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"},{"vulnerability":"VCID-kt1w-97bw-r7bp"},{"vulnerability":"VCID-p5ab-z4u4-akcv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.6.5"},{"url":"http://public2.vulnerablecode.io/api/packages/54867?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.7.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-67cn-ebsg-zbdd"},{"vulnerability":"VCID-6fnh-mjwd-9qee"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"},{"vulnerability":"VCID-kt1w-97bw-r7bp"},{"vulnerability":"VCID-p5ab-z4u4-akcv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.7.3"}],"aliases":["CVE-2016-5393","GHSA-7q56-mp4c-gggg"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5k2f-qcuj-7yex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15693?format=json","vulnerability_id":"VCID-67cn-ebsg-zbdd","summary":"Insecure Inherited Permissions in  Apache Hadoop\nIn Apache Hadoop 2.x before 2.7.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6811.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6811","reference_id":"","reference_type":"","scores":[{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.676","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67574","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67541","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67568","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67598","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67464","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67552","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67565","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67588","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6811"},{"reference_url":"https://lists.apache.org/thread.html/9ba3c12bbdfd5b2cae60909e48f92608e00c8d99196390b8cfeca307@%3Cgeneral.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/9ba3c12bbdfd5b2cae60909e48f92608e00c8d99196390b8cfeca307@%3Cgeneral.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/9ba3c12bbdfd5b2cae60909e48f92608e00c8d99196390b8cfeca307%40%3Cgeneral.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/9ba3c12bbdfd5b2cae60909e48f92608e00c8d99196390b8cfeca307%40%3Cgeneral.hadoop.apache.org%3E"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575106","reference_id":"1575106","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575106"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6811","reference_id":"CVE-2016-6811","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6811"},{"reference_url":"https://github.com/advisories/GHSA-mf7c-35mq-75pj","reference_id":"GHSA-mf7c-35mq-75pj","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-mf7c-35mq-75pj"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/54868?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.7.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-6fnh-mjwd-9qee"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"},{"vulnerability":"VCID-kt1w-97bw-r7bp"},{"vulnerability":"VCID-p5ab-z4u4-akcv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.7.4"}],"aliases":["CVE-2016-6811","GHSA-mf7c-35mq-75pj"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-67cn-ebsg-zbdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/10690?format=json","vulnerability_id":"VCID-6fnh-mjwd-9qee","summary":"Privilege escalation\nA user who can escalate to yarn user can possibly run arbitrary commands as root user.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8029.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8029","reference_id":"","reference_type":"","scores":[{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84319","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84314","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84305","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84281","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84276","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84184","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84244","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029"},{"reference_url":"https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190617-0001","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20190617-0001"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190617-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190617-0001/"},{"reference_url":"https://www.openwall.com/lists/oss-security/2019/05/30/1","reference_id":"","reference_type":"","scores":[],"url":"https://www.openwall.com/lists/oss-security/2019/05/30/1"},{"reference_url":"http://www.securityfocus.com/bid/108518","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/108518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1795321","reference_id":"1795321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1795321"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8029","reference_id":"CVE-2018-8029","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8029"},{"reference_url":"https://github.com/advisories/GHSA-37pw-qw47-4jxm","reference_id":"GHSA-37pw-qw47-4jxm","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-37pw-qw47-4jxm"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/33282?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.8.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.8.5"},{"url":"http://public2.vulnerablecode.io/api/packages/33283?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.9.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.9.2"},{"url":"http://public2.vulnerablecode.io/api/packages/33284?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@3.1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.1.1"}],"aliases":["CVE-2018-8029","GHSA-37pw-qw47-4jxm"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6fnh-mjwd-9qee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/5117?format=json","vulnerability_id":"VCID-6ue7-puv7-wbcb","summary":"Apache Hadoop 2.6.x encrypts intermediate data generated by a MapReduce job and stores it along with the encryption key in a credentials file on disk when the Intermediate data encryption feature is enabled, which allows local users to obtain sensitive information by reading the file.","references":[{"reference_url":"http://mail-archives.apache.org/mod_mbox/hadoop-general/201602.mbox/%3CCAGCyb56CPgQMcxZ7jP87SfM5OKGx+E49DtrzCTQ6+nQf2a4nSA%40mail.gmail.com%3E","reference_id":"","reference_type":"","scores":[],"url":"http://mail-archives.apache.org/mod_mbox/hadoop-general/201602.mbox/%3CCAGCyb56CPgQMcxZ7jP87SfM5OKGx+E49DtrzCTQ6+nQf2a4nSA%40mail.gmail.com%3E"},{"reference_url":"http://mail-archives.apache.org/mod_mbox/hadoop-general/201602.mbox/%3CCAGCyb56CPgQMcxZ7jP87SfM5OKGx+E49DtrzCTQ6+nQf2a4nSA@mail.gmail.com%3E","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://mail-archives.apache.org/mod_mbox/hadoop-general/201602.mbox/%3CCAGCyb56CPgQMcxZ7jP87SfM5OKGx+E49DtrzCTQ6+nQf2a4nSA@mail.gmail.com%3E"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1776","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20231","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20232","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2011","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20106","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20452","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20317","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20346","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20242","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1776"},{"reference_url":"https://github.com/apache/hadoop/commit/6b710a42e00acca405e085724c89cda016cf7442","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/hadoop/commit/6b710a42e00acca405e085724c89cda016cf7442"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-1776","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-1776"},{"reference_url":"http://www.securityfocus.com/bid/83259","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83259"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:hadoop:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:hadoop:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:hadoop:2.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:hadoop:2.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:hadoop:2.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:hadoop:2.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/advisories/GHSA-g48f-ff5h-5f64","reference_id":"GHSA-g48f-ff5h-5f64","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-g48f-ff5h-5f64"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82451?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.6.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-67cn-ebsg-zbdd"},{"vulnerability":"VCID-6fnh-mjwd-9qee"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"},{"vulnerability":"VCID-kt1w-97bw-r7bp"},{"vulnerability":"VCID-p5ab-z4u4-akcv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.6.5"}],"aliases":["CVE-2015-1776","GHSA-g48f-ff5h-5f64"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ue7-puv7-wbcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53290?format=json","vulnerability_id":"VCID-a8xd-ukj7-tqbk","summary":"Apache Hadoop argument injection vulnerability\nApache Hadoop's `FileUtil.unTar(File, File)` API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn localization, which does enable remote code execution. It is used in Apache Spark, from the SQL command ADD ARCHIVE. As the ADD ARCHIVE command adds new binaries to the classpath, being able to execute shell scripts does not confer new permissions to the caller. SPARK-38305. \"Check existence of file before untarring/zipping\", which is included in 3.3.0, 3.1.4, 3.2.2, prevents shell commands being executed, regardless of which version of the hadoop libraries are in use. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.3 or upper (including HADOOP-18136).","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25168.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25168.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25168","reference_id":"","reference_type":"","scores":[{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86623","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86553","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86572","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86597","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86594","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86601","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86606","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86598","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86616","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86535","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25168"},{"reference_url":"https://github.com/apache/hadoop","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop"},{"reference_url":"https://github.com/apache/hadoop/commit/cae749b076f35f0be13a926ee8cfbb7ce4402746","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop/commit/cae749b076f35f0be13a926ee8cfbb7ce4402746"},{"reference_url":"https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25168","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25168"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0007","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20220915-0007"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0007/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20220915-0007/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119084","reference_id":"2119084","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119084"},{"reference_url":"https://github.com/advisories/GHSA-8wm5-8h9c-47pc","reference_id":"GHSA-8wm5-8h9c-47pc","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-8wm5-8h9c-47pc"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/48648?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.10.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3fz1-e6n6-rfh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.10.2"},{"url":"http://public2.vulnerablecode.io/api/packages/80911?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@3.2.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3fz1-e6n6-rfh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.2.4"},{"url":"http://public2.vulnerablecode.io/api/packages/48650?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@3.3.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3fz1-e6n6-rfh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.3.3"}],"aliases":["CVE-2022-25168","GHSA-8wm5-8h9c-47pc"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a8xd-ukj7-tqbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8698?format=json","vulnerability_id":"VCID-kt1w-97bw-r7bp","summary":"Information Exposure\nVulnerability in Apache Hadoop allows a cluster user to expose private files owned by the user running the `MapReduce` job history server process. The malicious user can construct a configuration file containing XML directives that reference sensitive files on the `MapReduce` job history server host.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15713","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54321","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5426","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54285","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54332","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15713"},{"reference_url":"https://lists.apache.org/thread.html/a790a251ace7213bde9f69777dedb453b1a01a6d18289c14a61d4f91@%3Cgeneral.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/a790a251ace7213bde9f69777dedb453b1a01a6d18289c14a61d4f91@%3Cgeneral.hadoop.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15713","reference_id":"CVE-2017-15713","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15713"},{"reference_url":"https://github.com/advisories/GHSA-3v44-382q-55f4","reference_id":"GHSA-3v44-382q-55f4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-3v44-382q-55f4"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/26151?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.8.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-6fnh-mjwd-9qee"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"},{"vulnerability":"VCID-p5ab-z4u4-akcv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.8.3"},{"url":"http://public2.vulnerablecode.io/api/packages/24257?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@3.0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-6fnh-mjwd-9qee"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"},{"vulnerability":"VCID-p5ab-z4u4-akcv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.0.1"}],"aliases":["CVE-2017-15713","GHSA-3v44-382q-55f4"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kt1w-97bw-r7bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4561?format=json","vulnerability_id":"VCID-p5ab-z4u4-akcv","summary":"Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3892","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3892"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8009.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8009.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8009","reference_id":"","reference_type":"","scores":[{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90617","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90616","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90604","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90548","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05894","scoring_system":"epss","scoring_elements":"0.90607","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8009"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/apache/hadoop","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop"},{"reference_url":"https://github.com/apache/hadoop/commit/11a425d11a329010d0ff8255ecbcd1eb51b642e","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/hadoop/commit/11a425d11a329010d0ff8255ecbcd1eb51b642e"},{"reference_url":"https://github.com/apache/hadoop/commit/12258c7cff8d32710fbd8b9088a930e3ce27432","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop/commit/12258c7cff8d32710fbd8b9088a930e3ce27432"},{"reference_url":"https://github.com/apache/hadoop/commit/1373e3d8ad60e4da721a292912cb69243bfdf47","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/hadoop/commit/1373e3d8ad60e4da721a292912cb69243bfdf47"},{"reference_url":"https://github.com/apache/hadoop/commit/45a1c680c276c4501402f7bc4cebcf85a6fbc7f","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop/commit/45a1c680c276c4501402f7bc4cebcf85a6fbc7f"},{"reference_url":"https://github.com/apache/hadoop/commit/65e55097da2bb3f2fbdf9ba1946da25fe58bec9","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop/commit/65e55097da2bb3f2fbdf9ba1946da25fe58bec9"},{"reference_url":"https://github.com/apache/hadoop/commit/6a4ae6f6eeed1392a4828a5721fa1499f65bdde","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop/commit/6a4ae6f6eeed1392a4828a5721fa1499f65bdde"},{"reference_url":"https://github.com/apache/hadoop/commit/6d7d192e4799b51931e55217e02baec14d49607","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/hadoop/commit/6d7d192e4799b51931e55217e02baec14d49607"},{"reference_url":"https://github.com/apache/hadoop/commit/745f203e577bacb35b042206db94615141fa5e6","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/hadoop/commit/745f203e577bacb35b042206db94615141fa5e6"},{"reference_url":"https://github.com/apache/hadoop/commit/bd98d4e77cf9f7b2f4b1afb4d5e5bad0f6b2fde","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/hadoop/commit/bd98d4e77cf9f7b2f4b1afb4d5e5bad0f6b2fde"},{"reference_url":"https://github.com/apache/hadoop/commit/cedc28d4ab2a27ba47e15ab2711218d96ec88d2","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/hadoop/commit/cedc28d4ab2a27ba47e15ab2711218d96ec88d2"},{"reference_url":"https://github.com/apache/hadoop/commit/e3236a9680709de7a95ffbc11b20e1bdc95a860","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/hadoop/commit/e3236a9680709de7a95ffbc11b20e1bdc95a860"},{"reference_url":"https://github.com/apache/hadoop/commit/eaa2b8035b584dfcf7c79a33484eb2dffd3fdb1","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/hadoop/commit/eaa2b8035b584dfcf7c79a33484eb2dffd3fdb1"},{"reference_url":"https://github.com/apache/hadoop/commit/fc4c20fc3469674cb584a4fb98bac7e3c2277c9","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/hadoop/commit/fc4c20fc3469674cb584a4fb98bac7e3c2277c9"},{"reference_url":"https://hadoop.apache.org/cve_list.html#cve-2018-8009-http-cve-mitre-org-cgi-bin-cvename-cgi-name-cve-2018-8009-zip-slip-impact-on-apache-hadoop","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://hadoop.apache.org/cve_list.html#cve-2018-8009-http-cve-mitre-org-cgi-bin-cvename-cgi-name-cve-2018-8009-zip-slip-impact-on-apache-hadoop"},{"reference_url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/a1c227745ce30acbcf388c5b0cc8423e8bf495d619cd0fa973f7f38d@%3Cuser.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/a1c227745ce30acbcf388c5b0cc8423e8bf495d619cd0fa973f7f38d@%3Cuser.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E"},{"reference_url":"https://snyk.io/research/zip-slip-vulnerability","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://snyk.io/research/zip-slip-vulnerability"},{"reference_url":"http://www.securityfocus.com/bid/105927","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/105927"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1593018","reference_id":"1593018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1593018"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8009","reference_id":"CVE-2018-8009","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8009"},{"reference_url":"https://github.com/advisories/GHSA-6x48-j4x4-cqw3","reference_id":"GHSA-6x48-j4x4-cqw3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-6x48-j4x4-cqw3"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/33281?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.7.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-6fnh-mjwd-9qee"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"},{"vulnerability":"VCID-kt1w-97bw-r7bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.7.7"},{"url":"http://public2.vulnerablecode.io/api/packages/33282?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.8.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.8.5"},{"url":"http://public2.vulnerablecode.io/api/packages/33283?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@2.9.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.9.2"},{"url":"http://public2.vulnerablecode.io/api/packages/33284?format=json","purl":"pkg:maven/org.apache.hadoop/hadoop-common@3.1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1h2m-ywk8-b7dm"},{"vulnerability":"VCID-3fz1-e6n6-rfh6"},{"vulnerability":"VCID-a8xd-ukj7-tqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@3.1.1"}],"aliases":["CVE-2018-8009","GHSA-6x48-j4x4-cqw3"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ab-z4u4-akcv"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-common@2.6.3"}