Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-sw3q-jzqx-dkbn
Summary
Operation on a Resource after Expiration or Release in Jetty Server
In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.).
Aliases
0
alias CVE-2019-17638
1
alias GHSA-x3rh-m7vp-35f2
Fixed_packages
0
url pkg:deb/debian/jetty9@9.4.31-1?distro=trixie
purl pkg:deb/debian/jetty9@9.4.31-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.4.31-1%3Fdistro=trixie
1
url pkg:deb/debian/jetty9@9.4.50-4%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/jetty9@9.4.50-4%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.4.50-4%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/jetty9@9.4.50-4%2Bdeb11u2
purl pkg:deb/debian/jetty9@9.4.50-4%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ejr-3tea-kydr
1
vulnerability VCID-gdcf-9axf-1yaq
2
vulnerability VCID-gq93-ctd4-aqbp
3
vulnerability VCID-kx4x-gnk4-yugu
4
vulnerability VCID-memq-11qz-9qem
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.4.50-4%252Bdeb11u2
3
url pkg:deb/debian/jetty9@9.4.57-1.1~deb12u1?distro=trixie
purl pkg:deb/debian/jetty9@9.4.57-1.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.4.57-1.1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/jetty9@9.4.57-1.1~deb13u1?distro=trixie
purl pkg:deb/debian/jetty9@9.4.57-1.1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.4.57-1.1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/jetty9@9.4.58-1?distro=trixie
purl pkg:deb/debian/jetty9@9.4.58-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.4.58-1%3Fdistro=trixie
6
url pkg:deb/debian/jetty9@9.4.58-2?distro=trixie
purl pkg:deb/debian/jetty9@9.4.58-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.4.58-2%3Fdistro=trixie
7
url pkg:maven/org.eclipse.jetty/jetty-server@9.4.30.v20200611
purl pkg:maven/org.eclipse.jetty/jetty-server@9.4.30.v20200611
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9xw3-4a4u-hbbb
1
vulnerability VCID-kx4x-gnk4-yugu
2
vulnerability VCID-nubz-xqaw-tkfr
3
vulnerability VCID-nyxu-ekhs-gyb5
4
vulnerability VCID-prd3-mmuv-n3dc
5
vulnerability VCID-q35p-8qhp-aqec
6
vulnerability VCID-q3k2-1x5q-buhy
7
vulnerability VCID-uuju-ey95-tyfq
8
vulnerability VCID-y3mv-vmwd-tydt
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-server@9.4.30.v20200611
Affected_packages
0
url pkg:deb/debian/jetty9@9.2.21-1~bpo8%2B1
purl pkg:deb/debian/jetty9@9.2.21-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-12gq-ezut-ckhz
1
vulnerability VCID-1ejr-3tea-kydr
2
vulnerability VCID-3f6t-fkt7-wub9
3
vulnerability VCID-5781-s1ny-q7ey
4
vulnerability VCID-5qhm-ase5-5qhy
5
vulnerability VCID-9xw3-4a4u-hbbb
6
vulnerability VCID-ahev-zdjd-gqg1
7
vulnerability VCID-czhb-gqt2-17av
8
vulnerability VCID-dvyn-8phs-a3a6
9
vulnerability VCID-dznb-x27e-kqan
10
vulnerability VCID-g3ff-brt6-vkeh
11
vulnerability VCID-gdcf-9axf-1yaq
12
vulnerability VCID-gq93-ctd4-aqbp
13
vulnerability VCID-kvqz-fppe-d7fe
14
vulnerability VCID-kx4x-gnk4-yugu
15
vulnerability VCID-kxtv-ma18-8fer
16
vulnerability VCID-memq-11qz-9qem
17
vulnerability VCID-nubz-xqaw-tkfr
18
vulnerability VCID-nyxu-ekhs-gyb5
19
vulnerability VCID-p7cu-h519-83hx
20
vulnerability VCID-prd3-mmuv-n3dc
21
vulnerability VCID-q35p-8qhp-aqec
22
vulnerability VCID-q3k2-1x5q-buhy
23
vulnerability VCID-rpc4-u4aq-4qde
24
vulnerability VCID-sw3q-jzqx-dkbn
25
vulnerability VCID-thpu-76e5-j3d3
26
vulnerability VCID-tqm9-4ch7-s7b3
27
vulnerability VCID-u2b5-uyd6-fbh9
28
vulnerability VCID-uuju-ey95-tyfq
29
vulnerability VCID-y3mv-vmwd-tydt
30
vulnerability VCID-ypc7-f1nd-t7gn
31
vulnerability VCID-zdt8-jrn2-m3ff
32
vulnerability VCID-znv6-77jf-v3gu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.2.21-1~bpo8%252B1
1
url pkg:deb/debian/jetty9@9.2.21-1%2Bdeb9u1
purl pkg:deb/debian/jetty9@9.2.21-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-12gq-ezut-ckhz
1
vulnerability VCID-1ejr-3tea-kydr
2
vulnerability VCID-3f6t-fkt7-wub9
3
vulnerability VCID-5781-s1ny-q7ey
4
vulnerability VCID-5qhm-ase5-5qhy
5
vulnerability VCID-9xw3-4a4u-hbbb
6
vulnerability VCID-ahev-zdjd-gqg1
7
vulnerability VCID-czhb-gqt2-17av
8
vulnerability VCID-dvyn-8phs-a3a6
9
vulnerability VCID-dznb-x27e-kqan
10
vulnerability VCID-g3ff-brt6-vkeh
11
vulnerability VCID-gdcf-9axf-1yaq
12
vulnerability VCID-gq93-ctd4-aqbp
13
vulnerability VCID-kvqz-fppe-d7fe
14
vulnerability VCID-kx4x-gnk4-yugu
15
vulnerability VCID-kxtv-ma18-8fer
16
vulnerability VCID-memq-11qz-9qem
17
vulnerability VCID-nubz-xqaw-tkfr
18
vulnerability VCID-nyxu-ekhs-gyb5
19
vulnerability VCID-p7cu-h519-83hx
20
vulnerability VCID-prd3-mmuv-n3dc
21
vulnerability VCID-q35p-8qhp-aqec
22
vulnerability VCID-q3k2-1x5q-buhy
23
vulnerability VCID-rpc4-u4aq-4qde
24
vulnerability VCID-sw3q-jzqx-dkbn
25
vulnerability VCID-thpu-76e5-j3d3
26
vulnerability VCID-tqm9-4ch7-s7b3
27
vulnerability VCID-u2b5-uyd6-fbh9
28
vulnerability VCID-uuju-ey95-tyfq
29
vulnerability VCID-y3mv-vmwd-tydt
30
vulnerability VCID-ypc7-f1nd-t7gn
31
vulnerability VCID-zdt8-jrn2-m3ff
32
vulnerability VCID-znv6-77jf-v3gu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.2.21-1%252Bdeb9u1
2
url pkg:deb/debian/jetty9@9.2.23-1~bpo8%2B1
purl pkg:deb/debian/jetty9@9.2.23-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-12gq-ezut-ckhz
1
vulnerability VCID-1ejr-3tea-kydr
2
vulnerability VCID-3f6t-fkt7-wub9
3
vulnerability VCID-5781-s1ny-q7ey
4
vulnerability VCID-5qhm-ase5-5qhy
5
vulnerability VCID-9xw3-4a4u-hbbb
6
vulnerability VCID-ahev-zdjd-gqg1
7
vulnerability VCID-czhb-gqt2-17av
8
vulnerability VCID-dvyn-8phs-a3a6
9
vulnerability VCID-g3ff-brt6-vkeh
10
vulnerability VCID-gdcf-9axf-1yaq
11
vulnerability VCID-gq93-ctd4-aqbp
12
vulnerability VCID-kvqz-fppe-d7fe
13
vulnerability VCID-kx4x-gnk4-yugu
14
vulnerability VCID-kxtv-ma18-8fer
15
vulnerability VCID-memq-11qz-9qem
16
vulnerability VCID-nubz-xqaw-tkfr
17
vulnerability VCID-nyxu-ekhs-gyb5
18
vulnerability VCID-p7cu-h519-83hx
19
vulnerability VCID-prd3-mmuv-n3dc
20
vulnerability VCID-q35p-8qhp-aqec
21
vulnerability VCID-q3k2-1x5q-buhy
22
vulnerability VCID-rpc4-u4aq-4qde
23
vulnerability VCID-sw3q-jzqx-dkbn
24
vulnerability VCID-thpu-76e5-j3d3
25
vulnerability VCID-tqm9-4ch7-s7b3
26
vulnerability VCID-u2b5-uyd6-fbh9
27
vulnerability VCID-uuju-ey95-tyfq
28
vulnerability VCID-y3mv-vmwd-tydt
29
vulnerability VCID-ypc7-f1nd-t7gn
30
vulnerability VCID-zdt8-jrn2-m3ff
31
vulnerability VCID-znv6-77jf-v3gu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.2.23-1~bpo8%252B1
3
url pkg:deb/debian/jetty9@9.4.16-0%2Bdeb10u1
purl pkg:deb/debian/jetty9@9.4.16-0%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ejr-3tea-kydr
1
vulnerability VCID-3f6t-fkt7-wub9
2
vulnerability VCID-5781-s1ny-q7ey
3
vulnerability VCID-5qhm-ase5-5qhy
4
vulnerability VCID-9xw3-4a4u-hbbb
5
vulnerability VCID-ahev-zdjd-gqg1
6
vulnerability VCID-czhb-gqt2-17av
7
vulnerability VCID-dvyn-8phs-a3a6
8
vulnerability VCID-g3ff-brt6-vkeh
9
vulnerability VCID-gdcf-9axf-1yaq
10
vulnerability VCID-gq93-ctd4-aqbp
11
vulnerability VCID-kx4x-gnk4-yugu
12
vulnerability VCID-kxtv-ma18-8fer
13
vulnerability VCID-memq-11qz-9qem
14
vulnerability VCID-nubz-xqaw-tkfr
15
vulnerability VCID-nyxu-ekhs-gyb5
16
vulnerability VCID-p7cu-h519-83hx
17
vulnerability VCID-prd3-mmuv-n3dc
18
vulnerability VCID-q35p-8qhp-aqec
19
vulnerability VCID-q3k2-1x5q-buhy
20
vulnerability VCID-rpc4-u4aq-4qde
21
vulnerability VCID-sw3q-jzqx-dkbn
22
vulnerability VCID-thpu-76e5-j3d3
23
vulnerability VCID-tqm9-4ch7-s7b3
24
vulnerability VCID-uuju-ey95-tyfq
25
vulnerability VCID-y3mv-vmwd-tydt
26
vulnerability VCID-ypc7-f1nd-t7gn
27
vulnerability VCID-zdt8-jrn2-m3ff
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jetty9@9.4.16-0%252Bdeb10u1
4
url pkg:maven/org.eclipse.jetty/jetty-server@9.4.27
purl pkg:maven/org.eclipse.jetty/jetty-server@9.4.27
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-sw3q-jzqx-dkbn
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-server@9.4.27
5
url pkg:maven/org.eclipse.jetty/jetty-server@9.4.27.v20200227
purl pkg:maven/org.eclipse.jetty/jetty-server@9.4.27.v20200227
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9xw3-4a4u-hbbb
1
vulnerability VCID-kx4x-gnk4-yugu
2
vulnerability VCID-nubz-xqaw-tkfr
3
vulnerability VCID-nyxu-ekhs-gyb5
4
vulnerability VCID-prd3-mmuv-n3dc
5
vulnerability VCID-q35p-8qhp-aqec
6
vulnerability VCID-q3k2-1x5q-buhy
7
vulnerability VCID-sw3q-jzqx-dkbn
8
vulnerability VCID-uuju-ey95-tyfq
9
vulnerability VCID-y3mv-vmwd-tydt
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-server@9.4.27.v20200227
6
url pkg:maven/org.eclipse.jetty/jetty-server@9.4.28.v20200408
purl pkg:maven/org.eclipse.jetty/jetty-server@9.4.28.v20200408
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9xw3-4a4u-hbbb
1
vulnerability VCID-kx4x-gnk4-yugu
2
vulnerability VCID-nubz-xqaw-tkfr
3
vulnerability VCID-nyxu-ekhs-gyb5
4
vulnerability VCID-prd3-mmuv-n3dc
5
vulnerability VCID-q35p-8qhp-aqec
6
vulnerability VCID-q3k2-1x5q-buhy
7
vulnerability VCID-sw3q-jzqx-dkbn
8
vulnerability VCID-uuju-ey95-tyfq
9
vulnerability VCID-y3mv-vmwd-tydt
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-server@9.4.28.v20200408
7
url pkg:maven/org.eclipse.jetty/jetty-server@9.4.29.v20200521
purl pkg:maven/org.eclipse.jetty/jetty-server@9.4.29.v20200521
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9xw3-4a4u-hbbb
1
vulnerability VCID-kx4x-gnk4-yugu
2
vulnerability VCID-nubz-xqaw-tkfr
3
vulnerability VCID-nyxu-ekhs-gyb5
4
vulnerability VCID-prd3-mmuv-n3dc
5
vulnerability VCID-q35p-8qhp-aqec
6
vulnerability VCID-q3k2-1x5q-buhy
7
vulnerability VCID-sw3q-jzqx-dkbn
8
vulnerability VCID-uuju-ey95-tyfq
9
vulnerability VCID-y3mv-vmwd-tydt
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-server@9.4.29.v20200521
8
url pkg:maven/org.eclipse.jetty/jetty-server@9.4.30.v20200610
purl pkg:maven/org.eclipse.jetty/jetty-server@9.4.30.v20200610
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-sw3q-jzqx-dkbn
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-server@9.4.30.v20200610
9
url pkg:rpm/redhat/jenkins@2.235.5.1600414805-1?arch=el7
purl pkg:rpm/redhat/jenkins@2.235.5.1600414805-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cgen-qcyh-yqbu
1
vulnerability VCID-fy5p-8vcs-zkha
2
vulnerability VCID-re1r-xjv4-sqd3
3
vulnerability VCID-sw3q-jzqx-dkbn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.235.5.1600414805-1%3Farch=el7
10
url pkg:rpm/redhat/jenkins@2.235.5.1600415514-1?arch=el7
purl pkg:rpm/redhat/jenkins@2.235.5.1600415514-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cgen-qcyh-yqbu
1
vulnerability VCID-fy5p-8vcs-zkha
2
vulnerability VCID-he3v-ysf3-zkb8
3
vulnerability VCID-kusb-1k76-a3ck
4
vulnerability VCID-nqxw-x7ea-aqew
5
vulnerability VCID-re1r-xjv4-sqd3
6
vulnerability VCID-sw3q-jzqx-dkbn
7
vulnerability VCID-v5aw-ffxe-ckdv
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.235.5.1600415514-1%3Farch=el7
11
url pkg:rpm/redhat/jenkins@2.235.5.1600415953-1?arch=el7
purl pkg:rpm/redhat/jenkins@2.235.5.1600415953-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cgen-qcyh-yqbu
1
vulnerability VCID-fy5p-8vcs-zkha
2
vulnerability VCID-re1r-xjv4-sqd3
3
vulnerability VCID-sw3q-jzqx-dkbn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins@2.235.5.1600415953-1%3Farch=el7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17638.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17638
reference_id
reference_type
scores
0
value 0.30928
scoring_system epss
scoring_elements 0.96786
published_at 2026-05-14T12:55:00Z
1
value 0.30928
scoring_system epss
scoring_elements 0.96778
published_at 2026-05-12T12:55:00Z
2
value 0.30928
scoring_system epss
scoring_elements 0.96773
published_at 2026-05-11T12:55:00Z
3
value 0.30928
scoring_system epss
scoring_elements 0.96771
published_at 2026-05-09T12:55:00Z
4
value 0.30928
scoring_system epss
scoring_elements 0.96729
published_at 2026-04-08T12:55:00Z
5
value 0.30928
scoring_system epss
scoring_elements 0.96765
published_at 2026-05-07T12:55:00Z
6
value 0.30928
scoring_system epss
scoring_elements 0.96762
published_at 2026-05-05T12:55:00Z
7
value 0.30928
scoring_system epss
scoring_elements 0.96753
published_at 2026-04-29T12:55:00Z
8
value 0.30928
scoring_system epss
scoring_elements 0.9675
published_at 2026-04-26T12:55:00Z
9
value 0.30928
scoring_system epss
scoring_elements 0.96748
published_at 2026-04-24T12:55:00Z
10
value 0.30928
scoring_system epss
scoring_elements 0.96749
published_at 2026-04-21T12:55:00Z
11
value 0.30928
scoring_system epss
scoring_elements 0.96746
published_at 2026-04-18T12:55:00Z
12
value 0.30928
scoring_system epss
scoring_elements 0.96742
published_at 2026-04-16T12:55:00Z
13
value 0.30928
scoring_system epss
scoring_elements 0.96736
published_at 2026-04-13T12:55:00Z
14
value 0.30928
scoring_system epss
scoring_elements 0.96733
published_at 2026-04-12T12:55:00Z
15
value 0.30928
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-09T12:55:00Z
16
value 0.30928
scoring_system epss
scoring_elements 0.96721
published_at 2026-04-07T12:55:00Z
17
value 0.30928
scoring_system epss
scoring_elements 0.96717
published_at 2026-04-04T12:55:00Z
18
value 0.30928
scoring_system epss
scoring_elements 0.96715
published_at 2026-04-02T12:55:00Z
19
value 0.30928
scoring_system epss
scoring_elements 0.96705
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17638
2
reference_url https://bugs.eclipse.org/bugs/show_bug.cgi?id=564984
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.eclipse.org/bugs/show_bug.cgi?id=564984
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17638
4
reference_url https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba
5
reference_url https://github.com/eclipse/jetty.project/issues/4936
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse/jetty.project/issues/4936
6
reference_url https://lists.apache.org/thread.html/r29073905dc9139d0d7a146595694bf57bb9e35e5ec6aa73eb9c8443a@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r29073905dc9139d0d7a146595694bf57bb9e35e5ec6aa73eb9c8443a@%3Ccommits.pulsar.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r378e4cdec15e132575aa1dcb6296ffeff2a896745a8991522e266ad4@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r378e4cdec15e132575aa1dcb6296ffeff2a896745a8991522e266ad4@%3Ccommits.pulsar.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r4bdd3f7bb6820a79f9416b6667d718a06d269018619a75ce4b759318@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r4bdd3f7bb6820a79f9416b6667d718a06d269018619a75ce4b759318@%3Ccommits.pulsar.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r521168299e023fb075b57afe33d17ff1d09e8a10e0fd8c775ea0e028@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r521168299e023fb075b57afe33d17ff1d09e8a10e0fd8c775ea0e028@%3Ccommits.pulsar.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r7fc5f2ed49641ea91c433e3cd0fc3d31c0278c87b82b15c33b881415@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r7fc5f2ed49641ea91c433e3cd0fc3d31c0278c87b82b15c33b881415@%3Ccommits.pulsar.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r81f58591fb4716fb867b36956f30c7c8ad4ab3f23abc952d9d86a2a0@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r81f58591fb4716fb867b36956f30c7c8ad4ab3f23abc952d9d86a2a0@%3Ccommits.pulsar.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9a2cfa56d30782a0c17a5deb951a622d1f5c8de48e1c3b578ffc2a84@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r9a2cfa56d30782a0c17a5deb951a622d1f5c8de48e1c3b578ffc2a84@%3Ccommits.pulsar.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/ra8661fc8c69c647cb06153c1485d48484a833d873f75dfe45937e9de@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ra8661fc8c69c647cb06153c1485d48484a833d873f75dfe45937e9de@%3Ccommits.pulsar.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rbe1f230e87ea947593145d0072d0097ddb0af10fee1161db8ca1546c@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rbe1f230e87ea947593145d0072d0097ddb0af10fee1161db8ca1546c@%3Ccommits.pulsar.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rd98cfd012490cb02caa1a11aaa0cc38bff2d43bcce9b20c2f01063dd@%3Ccommits.pulsar.apache.org%3E
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rd98cfd012490cb02caa1a11aaa0cc38bff2d43bcce9b20c2f01063dd@%3Ccommits.pulsar.apache.org%3E
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB/
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17638
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-17638
21
reference_url https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-575561
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-575561
22
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuApr2021.html
23
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2020.html
24
reference_url http://www.openwall.com/lists/oss-security/2020/08/17/1
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2020/08/17/1
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1864680
reference_id 1864680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1864680
26
reference_url https://github.com/advisories/GHSA-x3rh-m7vp-35f2
reference_id GHSA-x3rh-m7vp-35f2
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x3rh-m7vp-35f2
27
reference_url https://access.redhat.com/errata/RHSA-2020:3808
reference_id RHSA-2020:3808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3808
28
reference_url https://access.redhat.com/errata/RHSA-2020:3841
reference_id RHSA-2020:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3841
29
reference_url https://access.redhat.com/errata/RHSA-2020:4220
reference_id RHSA-2020:4220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4220
30
reference_url https://access.redhat.com/errata/RHSA-2020:4223
reference_id RHSA-2020:4223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4223
31
reference_url https://access.redhat.com/errata/RHSA-2020:5568
reference_id RHSA-2020:5568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5568
Weaknesses
0
cwe_id 672
name Operation on a Resource after Expiration or Release
description The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
1
cwe_id 675
name Multiple Operations on Resource in Single-Operation Context
description The product performs the same operation on a resource two or more times, when the operation should only be applied once.
2
cwe_id 1341
name Multiple Releases of Same Resource or Handle
description The product attempts to close or release a resource or handle more than once, without any successful open between the close operations.
3
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
4
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score7.7 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-sw3q-jzqx-dkbn