References: | Source: MITRE Type: CNA CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20210420 Vulnerability in Jenkins
Source: XF Type: UNKNOWN eclipse-cve202128165-dos(199305)
Source: CCN Type: Jetty GIT Repository CPU 100% receiving an invalid large TLS frame
Source: CONFIRM Type: Exploit, Third Party Advisory https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20210407 [GitHub] [zookeeper] arshadmohammad commented on pull request #1676: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [spark-issues] 20210408 [jira] [Created] (SPARK-34988) Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] SparkQA removed a comment on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] srowen commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [kafka-jira] 20210412 [GitHub] [kafka] dongjinleekr commented on pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Issue Tracking, Mailing List, Patch, Third Party Advisory [solr-issues] 20210414 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [zookeeper-commits] 20210407 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] dongjoon-hyun closed pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [kafka-jira] 20210412 [jira] [Assigned] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] sarutak opened a new pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [hbase-issues] 20210407 [jira] [Updated] (HBASE-25746) [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Patch, Third Party Advisory [solr-issues] 20210507 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [zookeeper-issues] 20210407 [jira] [Updated] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.39 CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] srowen closed pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [spark-commits] 20210408 [spark] branch branch-3.0 updated: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [solr-issues] 20210623 [jira] [Updated] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] HyukjinKwon commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] sarutak opened a new pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [zookeeper-commits] 20210407 [zookeeper] branch master updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [kafka-jira] 20210715 [jira] [Commented] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210517 [GitHub] [spark] jeffreysmooth commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] dongjoon-hyun edited a comment on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] dongjoon-hyun commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [hbase-issues] 20210408 [jira] [Updated] (HBASE-25746) [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [ignite-issues] 20210426 [jira] [Commented] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [hbase-dev] 20210407 [jira] [Created] (HBASE-25746) [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) Upgrade Jetty version to fix CVE-2021-2816[3,4,5] in Jetty
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [pulsar-commits] 20210409 [GitHub] [pulsar] dinghram opened a new pull request #10183: CVE-2021-28165-Jetty
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-dev] 20210407 Re: [VOTE] Apache ZooKeeper release 3.6.3 candidate 1
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [ignite-issues] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] SparkQA commented on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [zookeeper-issues] 20210407 [jira] [Assigned] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.39 CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210517 [GitHub] [spark] dongjoon-hyun commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [kafka-dev] 20210412 [jira] [Created] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [kafka-jira] 20210412 [jira] [Created] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [kafka-dev] 20210413 [jira] [Resolved] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [ignite-issues] 20210426 [jira] [Updated] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty
Source: MLIST Type: Mailing List, Third Party Advisory [kafka-jira] 20210413 [GitHub] [kafka] edwin092 commented on pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] dongjoon-hyun commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [kafka-jira] 20210413 [GitHub] [kafka] chia7712 merged pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] SparkQA removed a comment on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [hbase-issues] 20210408 [GitHub] [hbase-thirdparty] apurtell merged pull request #49: HBASE-25746 [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] srowen commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] srowen commented on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [kafka-jira] 20210412 [GitHub] [kafka] dongjinleekr opened a new pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [zookeeper-commits] 20210407 [zookeeper] branch branch-3.7 updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [spark-issues] 20210408 [jira] [Updated] (SPARK-34988) Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [kafka-jira] 20210413 [GitHub] [kafka] dongjinleekr commented on pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [spark-issues] 20210408 [jira] [Commented] (SPARK-34988) Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [pulsar-commits] 20210412 [GitHub] [pulsar] jiazhai commented on pull request #10183: CVE-2021-28165-Jetty
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] sarutak opened a new pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [spark-issues] 20210408 [jira] [Assigned] (SPARK-34988) Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [solr-issues] 20210711 [jira] [Created] (SOLR-15529) High security vulnerability in JDOM library bundled within Solr 8.9 CVE-2021-33813
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] SparkQA commented on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20210407 [GitHub] [zookeeper] nkalmar commented on pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [spark-issues] 20210408 [jira] [Resolved] (SPARK-34988) Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20210407 [GitHub] [zookeeper] nkalmar opened a new pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20210407 [GitHub] [zookeeper] nkalmar opened a new pull request #1676: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [hbase-issues] 20210407 [GitHub] [hbase-thirdparty] apurtell opened a new pull request #49: HBASE-25746 [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20210407 [GitHub] [zookeeper] asfgit closed pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] SparkQA commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins removed a comment on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] SparkQA removed a comment on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20210407 [GitHub] [zookeeper] arshadmohammad closed pull request #1676: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins commented on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins removed a comment on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] MaxGekk closed pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins commented on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [hbase-issues] 20210407 [jira] [Created] (HBASE-25746) [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20210407 [GitHub] [zookeeper] nkalmar edited a comment on pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [solr-issues] 20210711 [jira] [Updated] (SOLR-15529) High security vulnerability in JDOM library bundled within Solr 8.9 CVE-2021-33813
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [zookeeper-issues] 20210407 [jira] [Created] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.39 CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins removed a comment on pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [kafka-jira] 20210412 [jira] [Updated] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [kafka-jira] 20210413 [jira] [Updated] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] SparkQA commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [zookeeper-commits] 20210407 [zookeeper] branch branch-3.6.3 updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [pulsar-commits] 20210412 [GitHub] [pulsar] jiazhai closed pull request #10183: CVE-2021-28165-Jetty
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [solr-issues] 20210813 [jira] [Resolved] (SOLR-15338) High security vulnerability in Jetty library CVE-2021-28163 (+5) bundled within Solr
Source: MLIST Type: Mailing List, Third Party Advisory [spark-commits] 20210408 [spark] branch branch-2.4 updated: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins commented on pull request #32095: [SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [kafka-jira] 20210413 [jira] [Resolved] (KAFKA-12655) CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [ignite-dev] 20210413 [jira] [Created] (IGNITE-14527) CVE-2021-2816[3,4,5] in Jetty
Source: MLIST Type: Mailing List, Third Party Advisory [kafka-jira] 20210413 [GitHub] [kafka] chia7712 commented on pull request #10526: KAFKA-12655: CVE-2021-28165 - Upgrade jetty to 9.4.39
Source: MLIST Type: Mailing List, Third Party Advisory [hbase-issues] 20210407 [GitHub] [hbase-thirdparty] Apache-HBase commented on pull request #49: HBASE-25746 [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] srowen closed pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [zookeeper-commits] 20210407 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] sarutak commented on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [hbase-commits] 20210408 [hbase-thirdparty] branch master updated: HBASE-25746 [hbase-thirdparty] Update jetty to >= 9.4.39 due to CVE-2021-28165 (#49)
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] sarutak opened a new pull request #32094: [SPARK-34988][CORE][3.0] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [zookeeper-issues] 20210407 [jira] [Updated] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.38 CVE-2021-28165
Source: MLIST Type: Issue Tracking, Mailing List, Third Party Advisory [zookeeper-dev] 20210407 [jira] [Created] (ZOOKEEPER-4277) dependency-check:check failing - jetty-server-9.4.39 CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] SparkQA removed a comment on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] viirya commented on pull request #32093: [SPARK-34988][CORE][2.4] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] AmplabJenkins removed a comment on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20210407 [GitHub] [zookeeper] arshadmohammad commented on pull request #1675: ZOOKEEPER-4277: update jetty to 9.4.39 due to CVE-2021-28165
Source: MLIST Type: Mailing List, Third Party Advisory [pulsar-commits] 20210409 [GitHub] [pulsar] merlimat commented on pull request #10183: CVE-2021-28165-Jetty
Source: MLIST Type: Mailing List, Third Party Advisory [spark-reviews] 20210408 [GitHub] [spark] MaxGekk commented on pull request #32091: [SPARK-34988][CORE] Upgrade Jetty for CVE-2021-28165
Source: CONFIRM Type: Mailing List, Third Party Advisory https://security.netapp.com/advisory/ntap-20210611-0006/
Source: DEBIAN Type: Third Party Advisory DSA-4949
Source: CCN Type: IBM Security Bulletin 6462299 (Resilient) IBM Resilient SOAR is Using Components with Known Vulnerabilities - Eclipse Jetty (CVE-2021-28163, CVE-2021-28164, CVE-2021-28165)
Source: CCN Type: IBM Security Bulletin 6466729 (Cognos Analytics) IBM Cognos Analytics has addressed multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6469939 (UrbanCode Deploy) CVE-2021-28165 In Eclipse Jetty CPU usage can reach 100% upon receiving a large invalid TLS frame.
Source: CCN Type: IBM Security Bulletin 6472057 (Resilient OnPrem) IBM Security SOAR is using a component with known vulnerabilities - Eclipse Jetty ( CVE-2021-28163, CVE-2021-28165, CVE-2020-27223)
Source: CCN Type: IBM Security Bulletin 6516422 (MQ) IBM MQ is vulnerable to an issue in Eclipse Jetty (CVE-2021-28165)
Source: CCN Type: IBM Security Bulletin 6520472 (QRadar SIEM) IBM QRadar SIEM is vulnerable to using components with know vulnerabilities
Source: CCN Type: IBM Security Bulletin 6567139 (Rational Functional Tester) An Eclipse Jetty vulnerability affects IBM Rational Functional Tester
Source: CCN Type: IBM Security Bulletin 6574019 (Process Mining) Vulnerability in Eclipse Jetty affects IBM Process Mining (CVE-2021-28165)
Source: CCN Type: IBM Security Bulletin 6584093 (MQ) IBM MQ is vulnerable to multiple Eclipse Jetty issues
Source: CCN Type: IBM Security Bulletin 6591193 (Sterling Connect:Direct Web Services) IBM Sterling Connect:Direct Web Services is vulnerable to multiple vulnerabilities due to Eclipse Jetty
Source: CCN Type: IBM Security Bulletin 6592799 (MaaS360 Mobile Enterprise Gateway) IBM MaaS360 Mobile Enterprise Gateway uses Eclipse Jetty with multiple known vulnerabilities
Source: CCN Type: IBM Security Bulletin 6597281 (Sterling Connect:Direct Browser User Interface) IBM Sterling Connect:Direct Browser User Interface is vulnerable to multiple vulnerabilities due to Jetty
Source: CCN Type: IBM Security Bulletin 6608622 (Rational Performance Tester) Vulnerabilities in Eclipse Jetty affect Rational Performance Tester (CVE-2021-28169, CVE-2021-34428, CVE-2021-28163, CVE-2021-28164, CVE-2021-34429, CVE-2021-28165)
Source: CCN Type: IBM Security Bulletin 6608624 (Rational Service Tester) Vulnerabilities in Eclipse Jetty affect Rational Service Tester (CVE-2021-28169, CVE-2021-34428, CVE-2021-28163, CVE-2021-28164, CVE-2021-34429, CVE-2021-28165)
Source: CCN Type: IBM Security Bulletin 6614725 (QRadar SIEM) IBM QRadar SIEM includes components with multiple known vulnerabilities
Source: CCN Type: IBM Security Bulletin 6825513 (Rational Change) Multiple Vulnerabilities in Rational Change Fix Pack 04 for 5.3.2
Source: CCN Type: IBM Security Bulletin 6825515 (Rational Synergy) Multiple Vulnerabilities in Rational Synergy 7.2.2.4
Source: CCN Type: IBM Security Bulletin 6829321 (InfoSphere Information Server) Multiple vulnerabilities in Eclipse Jetty affect IBM InfoSphere Information Server
Source: CCN Type: IBM Security Bulletin 6830871 (Enterprise Records) Vulnerability found in Eclipse Jetty may affect IBM Enterprise Records
Source: CCN Type: IBM Security Bulletin 6848225 (Netcool Operations Insight) Netcool Operations Insight v1.6.7 contains fixes for multiple security vulnerabilities.
Source: CCN Type: IBM Security Bulletin 6983272 (Business Automation Workflow) A CVE-2021-28165 vulnerability in Eclipse Jetty affects IBM Process Designer 8.5.7 shipped with IBM Business Automation Workflow
Source: CCN Type: IBM Security Bulletin 6983274 (Cognos Command Center) IBM Cognos Command Center is affected by multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 7001793 (App Connect Enterprise Toolkit) Multiple vulnerabilities affect the IBM App Connect Enterprise Toolkit and the IBM Integration Bus Toolkit
Source: CCN Type: IBM Security Bulletin 7005945 (Storage Protect) IBM Storage Protect Server is vulnerable to various attacks due to Eclipse jetty
Source: N/A Type: Patch, Third Party Advisory N/A
Source: MISC Type: Not Applicable, Third Party Advisory https://www.oracle.com/security-alerts/cpuapr2022.html
Source: CCN Type: Oracle CPUJan2022 Oracle Critical Patch Update Advisory - January 2022
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujan2022.html
Source: CCN Type: Oracle CPUOct2021 Oracle Critical Patch Update Advisory - October 2021
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuoct2021.html
|