CVE-2011-4461 REJECTED

Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

EPSS 3.00% · 86.5th percentile

Risk Scores

EPSS Score
3.00%
86.5th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSjetty0

Timeline

References

Open in Interactive Console →