Search for vulnerabilities
Vulnerability details: VCID-7yc8-hgnk-aaam
Vulnerability ID VCID-7yc8-hgnk-aaam
Aliases CVE-2021-34428
GHSA-m6cp-vxjx-65j6
Summary SessionListener can prevent a session from being invalidated breaking logout
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2021:3225
rhas Moderate https://access.redhat.com/errata/RHSA-2021:3700
rhas Moderate https://access.redhat.com/errata/RHSA-2021:3758
rhas Moderate https://access.redhat.com/errata/RHSA-2021:4767
rhas Critical https://access.redhat.com/errata/RHSA-2021:5134
cvssv3 3.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34428.json
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00551 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00551 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00551 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00551 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00551 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00551 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00705 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00752 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00752 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00752 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00773 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00877 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.00962 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
epss 0.09525 https://api.first.org/data/v1/epss?cve=CVE-2021-34428
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1974891
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10241
cvssv3.1 3.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr LOW https://github.com/advisories/GHSA-m6cp-vxjx-65j6
cvssv3.1 3.5 https://github.com/eclipse/jetty.project
generic_textual LOW https://github.com/eclipse/jetty.project
cvssv3.1 3.5 https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6
cvssv3.1_qr LOW https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6
generic_textual LOW https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6
cvssv3.1 3.5 https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E
cvssv3.1 3.5 https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E
cvssv3.1 3.5 https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E
cvssv3.1 3.5 https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E
cvssv3.1 3.5 https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E
cvssv3.1 3.5 https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E
cvssv2 3.6 https://nvd.nist.gov/vuln/detail/CVE-2021-34428
cvssv3 3.5 https://nvd.nist.gov/vuln/detail/CVE-2021-34428
cvssv3.1 3.5 https://nvd.nist.gov/vuln/detail/CVE-2021-34428
cvssv3.1 3.5 https://security.netapp.com/advisory/ntap-20210813-0003
generic_textual LOW https://security.netapp.com/advisory/ntap-20210813-0003
cvssv3.1 3.5 https://www.debian.org/security/2021/dsa-4949
generic_textual LOW https://www.debian.org/security/2021/dsa-4949
cvssv3.1 5.3 https://www.oracle.com/security-alerts/cpuapr2022.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpuapr2022.html
cvssv3.1 6.6 https://www.oracle.com/security-alerts/cpujan2022.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpujan2022.html
cvssv3.1 8.2 https://www.oracle.com/security-alerts/cpuoct2021.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuoct2021.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34428.json
https://api.first.org/data/v1/epss?cve=CVE-2021-34428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34428
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/eclipse/jetty.project
https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6
https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec%40%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084%40%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd%40%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450%40%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a%40%3Cissues.zookeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20210813-0003
https://security.netapp.com/advisory/ntap-20210813-0003/
https://www.debian.org/security/2021/dsa-4949
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
1974891 https://bugzilla.redhat.com/show_bug.cgi?id=1974891
990578 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990578
cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:rest_data_services:*:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:rest_data_services:*:*:*:*:-:*:*:*
cpe:2.3:a:oracle:siebel_core_-_automation:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:siebel_core_-_automation:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CVE-2021-34428 https://nvd.nist.gov/vuln/detail/CVE-2021-34428
GHSA-m6cp-vxjx-65j6 https://github.com/advisories/GHSA-m6cp-vxjx-65j6
RHSA-2021:3225 https://access.redhat.com/errata/RHSA-2021:3225
RHSA-2021:3700 https://access.redhat.com/errata/RHSA-2021:3700
RHSA-2021:3758 https://access.redhat.com/errata/RHSA-2021:3758
RHSA-2021:4767 https://access.redhat.com/errata/RHSA-2021:4767
RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134
No exploits are available.
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34428.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Found at https://github.com/eclipse/jetty.project
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-34428
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-34428
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-34428
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://security.netapp.com/advisory/ntap-20210813-0003
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://www.debian.org/security/2021/dsa-4949
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.oracle.com/security-alerts/cpuapr2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N Found at https://www.oracle.com/security-alerts/cpuoct2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.52192
EPSS Score 0.00152
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.