CVE-2024-6762

Source
https://cve.org/CVERecord?id=CVE-2024-6762
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-6762.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-6762
Aliases
Downstream
Published
2024-10-14T15:07:10.942Z
Modified
2026-05-13T05:47:22.761953818Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
Jetty PushSessionCacheFilter can cause remote DoS attacks
Details

Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory.

Database specific
{
    "cna_assigner": "eclipse",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/6xxx/CVE-2024-6762.json",
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

Git / github.com/jetty/jetty.project

Affected ranges

Type
GIT
Repo
https://github.com/jetty/jetty.project
Events

Affected versions

jetty-12.*
jetty-12.0.0x

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-6762.json"