Vulnerability Details CVE-2024-6762
Jetty PushSessionCacheFilter can be exploited by unauthenticated users
to launch remote DoS attacks by exhausting the server’s memory.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 70.1%
CVSS Severity
CVSS v3 Score 3.1
Products affected by CVE-2024-6762
-
cpe:2.3:a:eclipse:jetty:10.0.0
-
cpe:2.3:a:eclipse:jetty:10.0.1
-
cpe:2.3:a:eclipse:jetty:10.0.10
-
cpe:2.3:a:eclipse:jetty:10.0.11
-
cpe:2.3:a:eclipse:jetty:10.0.12
-
cpe:2.3:a:eclipse:jetty:10.0.13
-
cpe:2.3:a:eclipse:jetty:10.0.14
-
cpe:2.3:a:eclipse:jetty:10.0.15
-
cpe:2.3:a:eclipse:jetty:10.0.16
-
cpe:2.3:a:eclipse:jetty:10.0.17
-
cpe:2.3:a:eclipse:jetty:10.0.2
-
cpe:2.3:a:eclipse:jetty:10.0.3
-
cpe:2.3:a:eclipse:jetty:10.0.4
-
cpe:2.3:a:eclipse:jetty:10.0.5
-
cpe:2.3:a:eclipse:jetty:10.0.6
-
cpe:2.3:a:eclipse:jetty:10.0.7
-
cpe:2.3:a:eclipse:jetty:10.0.8
-
cpe:2.3:a:eclipse:jetty:10.0.9
-
cpe:2.3:a:eclipse:jetty:11.0.0
-
cpe:2.3:a:eclipse:jetty:11.0.1
-
cpe:2.3:a:eclipse:jetty:11.0.10
-
cpe:2.3:a:eclipse:jetty:11.0.11
-
cpe:2.3:a:eclipse:jetty:11.0.12
-
cpe:2.3:a:eclipse:jetty:11.0.13
-
cpe:2.3:a:eclipse:jetty:11.0.14
-
cpe:2.3:a:eclipse:jetty:11.0.15
-
cpe:2.3:a:eclipse:jetty:11.0.16
-
cpe:2.3:a:eclipse:jetty:11.0.17
-
cpe:2.3:a:eclipse:jetty:11.0.2
-
cpe:2.3:a:eclipse:jetty:11.0.3
-
cpe:2.3:a:eclipse:jetty:11.0.4
-
cpe:2.3:a:eclipse:jetty:11.0.5
-
cpe:2.3:a:eclipse:jetty:11.0.6
-
cpe:2.3:a:eclipse:jetty:11.0.7
-
cpe:2.3:a:eclipse:jetty:11.0.8
-
cpe:2.3:a:eclipse:jetty:11.0.9
-
cpe:2.3:a:eclipse:jetty:12.0.0
-
cpe:2.3:a:eclipse:jetty:12.0.1
-
cpe:2.3:a:eclipse:jetty:12.0.2
-
cpe:2.3:a:eclipse:jetty:12.0.3