{"id":"CVE-2024-6762","summary":"Jetty  PushSessionCacheFilter can cause remote DoS attacks","details":"Jetty PushSessionCacheFilter can be exploited by unauthenticated users \nto launch remote DoS attacks by exhausting the server’s memory.","aliases":["GHSA-r7m4-f9h5-gr79"],"modified":"2026-05-18T05:56:12.493601567Z","published":"2024-10-14T15:07:10.942Z","database_specific":{"cwe_ids":["CWE-400"],"cna_assigner":"eclipse","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/6xxx/CVE-2024-6762.json"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00001.html"},{"type":"WEB","url":"https://repo.maven.apache.org/maven2/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/6xxx/CVE-2024-6762.json"},{"type":"ADVISORY","url":"https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6762"},{"type":"REPORT","url":"https://gitlab.eclipse.org/security/cve-assignement/-/issues/24"},{"type":"FIX","url":"https://github.com/jetty/jetty.project/pull/10755"},{"type":"FIX","url":"https://github.com/jetty/jetty.project/pull/10756"},{"type":"FIX","url":"https://github.com/jetty/jetty.project/pull/9715"},{"type":"FIX","url":"https://github.com/jetty/jetty.project/pull/9716"},{"type":"PACKAGE","url":"https://github.com/jetty/jetty.project"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jetty/jetty.project","events":[{"introduced":"28100e8da711e44c0722ed10bd413ae862497539"},{"fixed":"9b415c6424a9e0614a349ae2d305800b33c5205a"}]}],"versions":["jetty-12.0.0x"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-6762.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}]}