Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3320 | Spring MVC controller vulnerable to a DoS attack |
Github GHSA |
GHSA-w3c8-7r8f-9jp8 | Spring MVC controller vulnerable to a DoS attack |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 09 May 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 |
Fri, 22 Nov 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 18 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware spring |
|
| CPEs | cpe:2.3:a:vmware:spring:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vmware
Vmware spring |
|
| Metrics |
ssvc
|
Mon, 18 Nov 2024 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Spring MVC controller methods with an @RequestBody byte[] method parameter are vulnerable to a DoS attack. | |
| Title | CVE-2024-38828: DoS via Spring MVC controller method with byte[] parameter | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2025-05-09T20:03:35.921Z
Reserved: 2024-06-19T22:32:07.790Z
Link: CVE-2024-38828
Updated: 2025-05-09T20:03:35.921Z
Status : Deferred
Published: 2024-11-18T04:15:04.233
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-38828
OpenCVE Enrichment
No data.
EUVD
Github GHSA