Vulnerability Details CVE-2024-6762
Jetty PushSessionCacheFilter can be exploited by unauthenticated users
to launch remote DoS attacks by exhausting the server’s memory.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 67.7%
CVSS Severity
CVSS v3 Score 3.1
Products affected by CVE-2024-6762
-
cpe:2.3:a:eclipse:jetty:10.0.0
-
cpe:2.3:a:eclipse:jetty:10.0.1
-
cpe:2.3:a:eclipse:jetty:10.0.10
-
cpe:2.3:a:eclipse:jetty:10.0.11
-
cpe:2.3:a:eclipse:jetty:10.0.12
-
cpe:2.3:a:eclipse:jetty:10.0.13
-
cpe:2.3:a:eclipse:jetty:10.0.14
-
cpe:2.3:a:eclipse:jetty:10.0.15
-
cpe:2.3:a:eclipse:jetty:10.0.16
-
cpe:2.3:a:eclipse:jetty:10.0.17
-
cpe:2.3:a:eclipse:jetty:10.0.2
-
cpe:2.3:a:eclipse:jetty:10.0.3
-
cpe:2.3:a:eclipse:jetty:10.0.4
-
cpe:2.3:a:eclipse:jetty:10.0.5
-
cpe:2.3:a:eclipse:jetty:10.0.6
-
cpe:2.3:a:eclipse:jetty:10.0.7
-
cpe:2.3:a:eclipse:jetty:10.0.8
-
cpe:2.3:a:eclipse:jetty:10.0.9
-
cpe:2.3:a:eclipse:jetty:11.0.0
-
cpe:2.3:a:eclipse:jetty:11.0.1
-
cpe:2.3:a:eclipse:jetty:11.0.10
-
cpe:2.3:a:eclipse:jetty:11.0.11
-
cpe:2.3:a:eclipse:jetty:11.0.12
-
cpe:2.3:a:eclipse:jetty:11.0.13
-
cpe:2.3:a:eclipse:jetty:11.0.14
-
cpe:2.3:a:eclipse:jetty:11.0.15
-
cpe:2.3:a:eclipse:jetty:11.0.16
-
cpe:2.3:a:eclipse:jetty:11.0.17
-
cpe:2.3:a:eclipse:jetty:11.0.2
-
cpe:2.3:a:eclipse:jetty:11.0.3
-
cpe:2.3:a:eclipse:jetty:11.0.4
-
cpe:2.3:a:eclipse:jetty:11.0.5
-
cpe:2.3:a:eclipse:jetty:11.0.6
-
cpe:2.3:a:eclipse:jetty:11.0.7
-
cpe:2.3:a:eclipse:jetty:11.0.8
-
cpe:2.3:a:eclipse:jetty:11.0.9
-
cpe:2.3:a:eclipse:jetty:12.0.0
-
cpe:2.3:a:eclipse:jetty:12.0.1
-
cpe:2.3:a:eclipse:jetty:12.0.2
-
cpe:2.3:a:eclipse:jetty:12.0.3