Search for packages
purl | pkg:deb/debian/jetty9@9.4.50-4%2Bdeb11u2 |
Next non-vulnerable version | 9.4.57-0+deb12u1 |
Latest non-vulnerable version | 9.4.57-1 |
Risk | 4.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1npy-8ft8-v3c4
Aliases: CVE-2024-9823 GHSA-j26w-f9rq-mr2q |
Eclipse Jetty has a denial of service vulnerability on DosFilter |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-297f-wcds-aqcw
Aliases: CVE-2024-6762 GHSA-r7m4-f9h5-gr79 |
Eclipse Jetty's PushSessionCacheFilter can cause remote DoS attacks |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-8d2b-qrs3-7fgg
Aliases: CVE-2024-8184 GHSA-g8m5-722r-8whq |
Eclipse Jetty's ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-juk7-qcef-zyer
Aliases: CVE-2024-13009 GHSA-q4rv-gq96-w7c5 |
**UNSUPPORTED WHEN ASSIGNED** GzipHandler causes part of request body to be seen as request body of a separate request In Eclipse Jetty versions 9.4.0 to 9.4.56 a buffer can be incorrectly released when confronted with a gzip error when inflating a request body. This can result in corrupted and/or inadvertent sharing of data between requests. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-1pjh-3upb-aaaq | HTTP/2 HPACK integer overflow and buffer allocation |
CVE-2023-36478
GHSA-wgh7-54f2-x98r |
VCID-3mq7-x8eg-aaaa | Buffer not correctly recycled in Gzip Request inflation |
CVE-2020-27218
GHSA-86wm-rrjm-8wh8 |
VCID-6y3x-kyj7-aaaf | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
CVE-2023-44487
GHSA-qppj-fm5r-hxr3 VSV00013 |
VCID-ggqc-qjf8-aaad | Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6. |
CVE-2024-22201
GHSA-rggv-cv7r-mw98 |