Search for vulnerabilities
Vulnerability details: VCID-297f-wcds-aqcw
Vulnerability ID VCID-297f-wcds-aqcw
Aliases CVE-2024-6762
GHSA-r7m4-f9h5-gr79
Summary Eclipse Jetty's PushSessionCacheFilter can cause remote DoS attacks
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 3.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6762.json
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00073 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0031 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00343 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00504 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0058 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0058 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0058 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0058 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0058 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0058 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00661 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00661 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.00661 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
epss 0.0196 https://api.first.org/data/v1/epss?cve=CVE-2024-6762
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr LOW https://github.com/advisories/GHSA-r7m4-f9h5-gr79
cvssv3.1 3.1 https://github.com/jetty/jetty.project
cvssv3.1 5.3 https://github.com/jetty/jetty.project
generic_textual LOW https://github.com/jetty/jetty.project
generic_textual MODERATE https://github.com/jetty/jetty.project
cvssv3.1 3.1 https://github.com/jetty/jetty.project/pull/10755
generic_textual LOW https://github.com/jetty/jetty.project/pull/10755
cvssv3.1 3.1 https://github.com/jetty/jetty.project/pull/10756
generic_textual LOW https://github.com/jetty/jetty.project/pull/10756
cvssv3.1 3.1 https://github.com/jetty/jetty.project/pull/9715
generic_textual LOW https://github.com/jetty/jetty.project/pull/9715
cvssv3.1 3.1 https://github.com/jetty/jetty.project/pull/9716
generic_textual LOW https://github.com/jetty/jetty.project/pull/9716
cvssv3.1 3.1 https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79
cvssv3.1_qr LOW https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79
generic_textual LOW https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79
ssvc Track https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79
cvssv3.1 3.1 https://gitlab.eclipse.org/security/cve-assignement/-/issues/24
generic_textual LOW https://gitlab.eclipse.org/security/cve-assignement/-/issues/24
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2024-6762
cvssv3.1 3.1 https://nvd.nist.gov/vuln/detail/CVE-2024-6762
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2024-6762
generic_textual LOW https://nvd.nist.gov/vuln/detail/CVE-2024-6762
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6762.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/jetty/jetty.project
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/jetty/jetty.project
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/jetty/jetty.project/pull/10755
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/jetty/jetty.project/pull/10756
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/jetty/jetty.project/pull/9715
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/jetty/jetty.project/pull/9716
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:42:42Z/ Found at https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://gitlab.eclipse.org/security/cve-assignement/-/issues/24
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-6762
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2024-6762
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-6762
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.11214
EPSS Score 0.00044
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-10-15T00:59:21.422752+00:00 GHSA Importer Import https://github.com/advisories/GHSA-r7m4-f9h5-gr79 34.0.2