Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wme5-ec4u-jqd8
Summary
Missing Authentication for Critical Function
Two `wchp` and `wchc` commands are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests.
Aliases
0
alias CVE-2017-5637
1
alias GHSA-7cwj-j333-x7f7
Fixed_packages
0
url pkg:deb/debian/zookeeper@3.4.9-3?distro=trixie
purl pkg:deb/debian/zookeeper@3.4.9-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.9-3%3Fdistro=trixie
1
url pkg:deb/debian/zookeeper@3.4.9-3%2Bdeb8u1
purl pkg:deb/debian/zookeeper@3.4.9-3%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.9-3%252Bdeb8u1
2
url pkg:deb/debian/zookeeper@3.4.13-6%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zookeeper@3.4.13-6%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
2
vulnerability VCID-w64v-sgpz-7fhj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.13-6%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/zookeeper@3.8.0-11%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/zookeeper@3.8.0-11%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.8.0-11%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/zookeeper@3.9.3-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.3-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
2
vulnerability VCID-hbdm-1ts5-f7ad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.3-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/zookeeper@3.9.5-1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.5-1%3Fdistro=trixie
6
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.10
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d5ku-8mny-tfed
1
vulnerability VCID-e41j-4y91-7kd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.10
7
url pkg:maven/org.apache.zookeeper/zookeeper@3.5.3-beta
purl pkg:maven/org.apache.zookeeper/zookeeper@3.5.3-beta
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.3-beta
Affected_packages
0
url pkg:deb/debian/zookeeper@3.3.5%2Bdfsg1-2
purl pkg:deb/debian/zookeeper@3.3.5%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
4
vulnerability VCID-xfzk-mnyd-zqcf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.3.5%252Bdfsg1-2
1
url pkg:deb/debian/zookeeper@3.4.5%2Bdfsg-2
purl pkg:deb/debian/zookeeper@3.4.5%2Bdfsg-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
4
vulnerability VCID-xfzk-mnyd-zqcf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.5%252Bdfsg-2
2
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.0
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.0
3
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.1
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.1
4
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.2
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.2
5
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.3
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.3
6
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.4
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.4
7
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.5
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.5
8
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.6
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.6
9
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.7
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.7
10
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.8
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.8
11
url pkg:maven/org.apache.zookeeper/zookeeper@3.4.9
purl pkg:maven/org.apache.zookeeper/zookeeper@3.4.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.9
12
url pkg:maven/org.apache.zookeeper/zookeeper@3.5.0
purl pkg:maven/org.apache.zookeeper/zookeeper@3.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-e41j-4y91-7kd8
2
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.0
13
url pkg:maven/org.apache.zookeeper/zookeeper@3.5.1-alpha
purl pkg:maven/org.apache.zookeeper/zookeeper@3.5.1-alpha
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.1-alpha
14
url pkg:maven/org.apache.zookeeper/zookeeper@3.5.2-alpha
purl pkg:maven/org.apache.zookeeper/zookeeper@3.5.2-alpha
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3pn-rybm-6kdy
1
vulnerability VCID-d5ku-8mny-tfed
2
vulnerability VCID-e41j-4y91-7kd8
3
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.2-alpha
15
url pkg:maven/org.apache.zookeeper/zookeeper@3.5.2
purl pkg:maven/org.apache.zookeeper/zookeeper@3.5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wme5-ec4u-jqd8
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.2
References
0
reference_url https://access.redhat.com/errata/RHSA-2017:2477
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:2477
1
reference_url https://access.redhat.com/errata/RHSA-2017:3354
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3354
2
reference_url https://access.redhat.com/errata/RHSA-2017:3355
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3355
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5637.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5637.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5637
reference_id
reference_type
scores
0
value 0.17446
scoring_system epss
scoring_elements 0.95071
published_at 2026-04-12T12:55:00Z
1
value 0.17446
scoring_system epss
scoring_elements 0.9507
published_at 2026-04-11T12:55:00Z
2
value 0.17446
scoring_system epss
scoring_elements 0.95074
published_at 2026-04-13T12:55:00Z
3
value 0.17446
scoring_system epss
scoring_elements 0.95083
published_at 2026-04-16T12:55:00Z
4
value 0.17446
scoring_system epss
scoring_elements 0.95086
published_at 2026-04-18T12:55:00Z
5
value 0.17446
scoring_system epss
scoring_elements 0.95089
published_at 2026-04-21T12:55:00Z
6
value 0.17446
scoring_system epss
scoring_elements 0.95088
published_at 2026-04-24T12:55:00Z
7
value 0.17446
scoring_system epss
scoring_elements 0.9509
published_at 2026-04-29T12:55:00Z
8
value 0.17446
scoring_system epss
scoring_elements 0.95052
published_at 2026-04-04T12:55:00Z
9
value 0.17446
scoring_system epss
scoring_elements 0.95041
published_at 2026-04-01T12:55:00Z
10
value 0.17446
scoring_system epss
scoring_elements 0.95065
published_at 2026-04-09T12:55:00Z
11
value 0.17446
scoring_system epss
scoring_elements 0.95062
published_at 2026-04-08T12:55:00Z
12
value 0.17446
scoring_system epss
scoring_elements 0.95054
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5637
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637
6
reference_url https://issues.apache.org/jira/browse/ZOOKEEPER-2693
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/ZOOKEEPER-2693
7
reference_url https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370@%3Cdev.zookeeper.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370@%3Cdev.zookeeper.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370%40%3Cdev.zookeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370%40%3Cdev.zookeeper.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E
15
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2020.html
16
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com//security-alerts/cpujul2021.html
17
reference_url http://www.debian.org/security/2017/dsa-3871
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2017/dsa-3871
18
reference_url http://www.securityfocus.com/bid/98814
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/98814
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1454808
reference_id 1454808
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1454808
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863811
reference_id 863811
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863811
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.8:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.9:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:zookeeper:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/42294.py
reference_id CVE-2017-5637
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/42294.py
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5637
reference_id CVE-2017-5637
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-5637
37
reference_url https://github.com/advisories/GHSA-7cwj-j333-x7f7
reference_id GHSA-7cwj-j333-x7f7
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7cwj-j333-x7f7
38
reference_url https://usn.ubuntu.com/USN-4789-1/
reference_id USN-USN-4789-1
reference_type
scores
url https://usn.ubuntu.com/USN-4789-1/
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 306
name Missing Authentication for Critical Function
description The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
2
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
4
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
0
date_added 2017-07-04
description Zookeeper 3.5.2 Client - Denial of Service
required_action null
due_date null
notes null
known_ransomware_campaign_use false
source_date_published 2017-07-02
exploit_type dos
platform multiple
source_date_updated 2017-10-04
data_source Exploit-DB
source_url
Severity_range_score5.0 - 8.9
Exploitability2.0
Weighted_severity8.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wme5-ec4u-jqd8