{"url":"http://public2.vulnerablecode.io/api/packages/91688?format=json","purl":"pkg:rpm/redhat/eap8-hornetq@2.4.10-1.Final_redhat_00001.1?arch=el8eap","type":"rpm","namespace":"redhat","name":"eap8-hornetq","version":"2.4.10-1.Final_redhat_00001.1","qualifiers":{"arch":"el8eap"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/14862?format=json","vulnerability_id":"VCID-3zsw-hyhp-4yfm","summary":"Withdrawn Advisory: undertow: information leakage via HTTP/2 request header reuse\n# Withdrawn Advisory\nThis advisory has been withdrawn because it was determined to not be a valid vulnerability. This link is maintained to preserve external references. For more information, see https://nvd.nist.gov/vuln/detail/CVE-2024-4109.\n\n# Original Description\nA flaw was found in Undertow. An HTTP request header value from a previous stream may be incorrectly reused for a request associated with a subsequent stream on the same HTTP/2 connection. This issue can potentially lead to information leakage between requests.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10927","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2024:10927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10928","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2024:10928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10929","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2024:10929"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10933","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2024:10933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11559","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2024:11559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11560","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2024:11560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11570","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2024:11570"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4109.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4109.json"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-4109","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/security/cve/CVE-2024-4109"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272325","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272325"},{"reference_url":"https://github.com/undertow-io/undertow","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/undertow-io/undertow"},{"reference_url":"https://github.com/undertow-io/undertow/blob/6ae61c6af88d2a8341922ccd0de98926e8349543/core/src/main/java/io/undertow/protocols/http2/HpackDecoder.java#L250-L259","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/undertow-io/undertow/blob/6ae61c6af88d2a8341922ccd0de98926e8349543/core/src/main/java/io/undertow/protocols/http2/HpackDecoder.java#L250-L259"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4109","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4109"},{"reference_url":"https://github.com/advisories/GHSA-22c5-cpvr-cfvq","reference_id":"GHSA-22c5-cpvr-cfvq","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-22c5-cpvr-cfvq"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16668","reference_id":"RHSA-2025:16668","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16668"}],"fixed_packages":[],"aliases":["CVE-2024-4109","GHSA-22c5-cpvr-cfvq"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3zsw-hyhp-4yfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/17569?format=json","vulnerability_id":"VCID-myp6-7rre-euex","summary":"hornetq vulnerable to file overwrite, sensitive information disclosure\nAn issue in the `createTempFile` method of hornetq v2.4.9 allows attackers to arbitrarily overwrite files or access sensitive information.","references":[{"reference_url":"http://hornetq.com","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"8.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-06T16:04:11Z/"}],"url":"http://hornetq.com"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51127.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-51127","reference_id":"","reference_type":"","scores":[{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80889","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80763","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80783","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.8078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80807","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80816","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80833","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.8081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80849","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01455","scoring_system":"epss","scoring_elements":"0.80877","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-51127"},{"reference_url":"https://github.com/darranl/hornetq","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"8.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/darranl/hornetq"},{"reference_url":"https://github.com/hornetq/hornetq/blob/HornetQ_2_4_9_Final/hornetq-core-client/src/main/java/org/hornetq/core/client/impl/ClientConsumerImpl.java#L665C35-L665C49","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"8.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/hornetq/hornetq/blob/HornetQ_2_4_9_Final/hornetq-core-client/src/main/java/org/hornetq/core/client/impl/ClientConsumerImpl.java#L665C35-L665C49"},{"reference_url":"https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"8.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-06T16:04:11Z/"}],"url":"https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2024-51127","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"8.0","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-51127"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323697","reference_id":"2323697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323697"},{"reference_url":"https://github.com/advisories/GHSA-r7mv-mv7m-pjw3","reference_id":"GHSA-r7mv-mv7m-pjw3","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-r7mv-mv7m-pjw3"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11529","reference_id":"RHSA-2024:11529","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11529"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11531","reference_id":"RHSA-2024:11531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0371","reference_id":"RHSA-2025:0371","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0371"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0372","reference_id":"RHSA-2025:0372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1635","reference_id":"RHSA-2025:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1636","reference_id":"RHSA-2025:1636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1637","reference_id":"RHSA-2025:1637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1638","reference_id":"RHSA-2025:1638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16668","reference_id":"RHSA-2025:16668","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16668"}],"fixed_packages":[],"aliases":["CVE-2024-51127","GHSA-r7mv-mv7m-pjw3"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-myp6-7rre-euex"}],"fixing_vulnerabilities":[],"risk_score":"4.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap8-hornetq@2.4.10-1.Final_redhat_00001.1%3Farch=el8eap"}