{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8354?format=json","vulnerability_id":"VCID-wme5-ec4u-jqd8","summary":"Missing Authentication for Critical Function\nTwo `wchp` and `wchc` commands are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests.","aliases":[{"alias":"CVE-2017-5637"},{"alias":"GHSA-7cwj-j333-x7f7"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/944018?format=json","purl":"pkg:deb/debian/zookeeper@3.4.9-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.9-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1035712?format=json","purl":"pkg:deb/debian/zookeeper@3.4.9-3%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.9-3%252Bdeb8u1"},{"url":"http://public2.vulnerablecode.io/api/packages/944015?format=json","purl":"pkg:deb/debian/zookeeper@3.4.13-6%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t8x-dmby-ubep"},{"vulnerability":"VCID-6789-5wwx-qqch"},{"vulnerability":"VCID-w64v-sgpz-7fhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.13-6%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/944013?format=json","purl":"pkg:deb/debian/zookeeper@3.8.0-11%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t8x-dmby-ubep"},{"vulnerability":"VCID-6789-5wwx-qqch"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.8.0-11%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/944017?format=json","purl":"pkg:deb/debian/zookeeper@3.9.3-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t8x-dmby-ubep"},{"vulnerability":"VCID-6789-5wwx-qqch"},{"vulnerability":"VCID-hbdm-1ts5-f7ad"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.3-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/944016?format=json","purl":"pkg:deb/debian/zookeeper@3.9.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/25030?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.10"},{"url":"http://public2.vulnerablecode.io/api/packages/143456?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.5.3-beta","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.3-beta"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035710?format=json","purl":"pkg:deb/debian/zookeeper@3.3.5%2Bdfsg1-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"},{"vulnerability":"VCID-xfzk-mnyd-zqcf"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.3.5%252Bdfsg1-2"},{"url":"http://public2.vulnerablecode.io/api/packages/1035711?format=json","purl":"pkg:deb/debian/zookeeper@3.4.5%2Bdfsg-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"},{"vulnerability":"VCID-xfzk-mnyd-zqcf"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.5%252Bdfsg-2"},{"url":"http://public2.vulnerablecode.io/api/packages/25026?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.0"},{"url":"http://public2.vulnerablecode.io/api/packages/165346?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.1"},{"url":"http://public2.vulnerablecode.io/api/packages/165347?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.2"},{"url":"http://public2.vulnerablecode.io/api/packages/165348?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.3"},{"url":"http://public2.vulnerablecode.io/api/packages/165349?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.4"},{"url":"http://public2.vulnerablecode.io/api/packages/165350?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.5"},{"url":"http://public2.vulnerablecode.io/api/packages/165351?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.6"},{"url":"http://public2.vulnerablecode.io/api/packages/165352?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.7"},{"url":"http://public2.vulnerablecode.io/api/packages/165353?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.8"},{"url":"http://public2.vulnerablecode.io/api/packages/25027?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.4.9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.4.9"},{"url":"http://public2.vulnerablecode.io/api/packages/25028?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.5.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/165354?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.5.1-alpha","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.1-alpha"},{"url":"http://public2.vulnerablecode.io/api/packages/165355?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.5.2-alpha","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a3pn-rybm-6kdy"},{"vulnerability":"VCID-d5ku-8mny-tfed"},{"vulnerability":"VCID-e41j-4y91-7kd8"},{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.2-alpha"},{"url":"http://public2.vulnerablecode.io/api/packages/25029?format=json","purl":"pkg:maven/org.apache.zookeeper/zookeeper@3.5.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wme5-ec4u-jqd8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.5.2"}],"references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2477","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2017:2477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3354","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2017:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3355","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2017:3355"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5637.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5637","reference_id":"","reference_type":"","scores":[{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95052","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95071","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95083","published_at":"2026-04-16T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95089","published_at":"2026-04-21T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95088","published_at":"2026-04-24T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.9509","published_at":"2026-04-29T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95102","published_at":"2026-05-05T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95074","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.9507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95062","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17446","scoring_system":"epss","scoring_elements":"0.95054","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637"},{"reference_url":"https://issues.apache.org/jira/browse/ZOOKEEPER-2693","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/ZOOKEEPER-2693"},{"reference_url":"https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370@%3Cdev.zookeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370@%3Cdev.zookeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370%40%3Cdev.zookeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370%40%3Cdev.zookeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"https://www.oracle.com//security-alerts/cpujul2021.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3871","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2017/dsa-3871"},{"reference_url":"http://www.securityfocus.com/bid/98814","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/98814"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1454808","reference_id":"1454808","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1454808"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863811","reference_id":"863811","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863811"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:zookeeper:3.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:zookeeper:3.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/42294.py","reference_id":"CVE-2017-5637","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/42294.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5637","reference_id":"CVE-2017-5637","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5637"},{"reference_url":"https://github.com/advisories/GHSA-7cwj-j333-x7f7","reference_id":"GHSA-7cwj-j333-x7f7","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-7cwj-j333-x7f7"},{"reference_url":"https://usn.ubuntu.com/USN-4789-1/","reference_id":"USN-USN-4789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4789-1/"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":306,"name":"Missing Authentication for Critical Function","description":"The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources."},{"cwe_id":400,"name":"Uncontrolled Resource Consumption","description":"The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."},{"cwe_id":20,"name":"Improper Input Validation","description":"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."}],"exploits":[{"date_added":"2017-07-04","description":"Zookeeper 3.5.2 Client - Denial of Service","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":false,"source_date_published":"2017-07-02","exploit_type":"dos","platform":"multiple","source_date_updated":"2017-10-04","data_source":"Exploit-DB","source_url":""}],"severity_range_score":"5.0 - 8.9","exploitability":"2.0","weighted_severity":"8.0","risk_score":10.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wme5-ec4u-jqd8"}