{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T20:39:44.830","vulnerabilities":[{"cve":{"id":"CVE-2017-7561","sourceIdentifier":"secalert@redhat.com","published":"2017-09-13T17:29:00.947","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Red Hat JBoss EAP version 3.0.7 through before 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact."},{"lang":"es","value":"Red Hat JBoss EAP en su versión 3.0.7 hasta antes de la versión 4.0.0.Beta1 es vulnerable a un envenenamiento de la caché por parte del servidor o a peticiones CORS en el componente JAX-RS, resultando en un impacto moderado."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-346"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-444"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.0.7:*:*:*:*:*:*:*","matchCriteriaId":"25033CDC-E3CA-47D6-B1BB-6838D9DCAF8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.0.8:*:*:*:*:*:*:*","matchCriteriaId":"5D7CB4CB-4143-4FC1-970C-D102BA119B38"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.1.0:*:*:*:*:*:*:*","matchCriteriaId":"9F498215-6D52-4F74-A8ED-D151DA1E09E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"FCEB4E47-CE89-437D-BA89-4FC163F6BDE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.1.2:*:*:*:*:*:*:*","matchCriteriaId":"9B8683E0-C5FF-4D6A-8079-08E822733B41"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.1.4:*:*:*:*:*:*:*","matchCriteriaId":"926A7B4B-54B3-4E58-A66E-1DBD6246F657"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.1.5:*:*:*:*:*:*:*","matchCriteriaId":"BDF85FD4-6231-4554-AF41-D3EEA2D56466"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"A5C8C145-1E87-44FA-881E-7EF9F737AF50"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"AED9028C-999D-4658-91FD-9083E822CADF"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"94E9BAD1-3484-4758-A3FC-D42F963A5A06"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.2.9:*:*:*:*:*:*:*","matchCriteriaId":"E65D0A95-B2C2-4708-B0FB-8D3100FD522B"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.2.13:*:*:*:*:*:*:*","matchCriteriaId":"04F3E403-66B7-4E23-9B9D-E6BB2F7D56C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.3.0:*:*:*:*:*:*:*","matchCriteriaId":"4BC3A3D4-CB51-40AA-9267-5D723DC71421"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"431D16DC-F569-4CA9-8BF2-9CB7E3D2856D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/100465","source":"secalert@redhat.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2018:0002","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2018:0003","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2018:0004","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2018:0005","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2018:0478","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2018:0479","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2018:0480","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2018:0481","source":"secalert@redhat.com"},{"url":"https://issues.jboss.org/browse/RESTEASY-1704","source":"secalert@redhat.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/100465","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2018:0002","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2018:0003","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2018:0004","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2018:0005","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2018:0478","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2018:0479","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2018:0480","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2018:0481","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://issues.jboss.org/browse/RESTEASY-1704","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}