Total vulnerabilities in the database
Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.
Software | From | Fixed in |
---|---|---|
jetty / jetty_http_server | 4.2.11 | 4.2.11.x |
jetty / jetty_http_server | 6.1.0_pre2 | 6.1.0_pre2.x |
jetty / jetty_http_server | 4.2.12 | 4.2.12.x |
jetty / jetty_http_server | 5.1.11 | 5.1.11.x |
jetty / jetty_http_server | 4.2.18 | 4.2.18.x |
jetty / jetty_http_server | 6.0.1 | 6.0.1.x |
jetty / jetty_http_server | 4.2.19 | 4.2.19.x |
jetty / jetty_http_server | 4.2.16 | 4.2.16.x |
jetty / jetty_http_server | 4.2.15 | 4.2.15.x |
jetty / jetty_http_server | 4.2.9 | 4.2.9.x |
jetty / jetty_http_server | 4.2.14 | 4.2.14.x |
jetty / jetty_http_server | 4.2.17 | 4.2.17.x |
jetty / jetty_http_server | 4.2.24 | 4.2.24.x |