Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Do not use ThreadLimitHandler. Consider use of QoSHandler instead to artificially limit resource utilization.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4106-1 | jetty9 security update |
Debian DSA |
DSA-5894-1 | jetty9 security update |
EUVD |
EUVD-2024-3044 | There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory. |
Github GHSA |
GHSA-g8m5-722r-8whq | Eclipse Jetty's ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 13 Dec 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhboac Hawtio
|
|
| CPEs | cpe:/a:redhat:rhboac_hawtio:4.0.0 | |
| Vendors & Products |
Redhat rhboac Hawtio
|
Thu, 14 Nov 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat amq Streams |
|
| CPEs | cpe:/a:redhat:amq_streams:2 | |
| Vendors & Products |
Redhat
Redhat amq Streams |
Fri, 08 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse jetty |
|
| Weaknesses | CWE-770 | |
| CPEs | cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Eclipse
Eclipse jetty |
Tue, 15 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 15 Oct 2024 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 14 Oct 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Impact Remote DOS attack can cause out of memory Description There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory. Affected Versions * Jetty 12.0.0-12.0.8 (Supported) * Jetty 11.0.0-11.0.23 (EOL) * Jetty 10.0.0-10.0.23 (EOL) * Jetty 9.3.12-9.4.55 (EOL) Patched Versions * Jetty 12.0.9 * Jetty 11.0.24 * Jetty 10.0.24 * Jetty 9.4.56 | There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory. |
Mon, 14 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Impact Remote DOS attack can cause out of memory Description There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory. Affected Versions * Jetty 12.0.0-12.0.8 (Supported) * Jetty 11.0.0-11.0.23 (EOL) * Jetty 10.0.0-10.0.23 (EOL) * Jetty 9.3.12-9.4.55 (EOL) Patched Versions * Jetty 12.0.9 * Jetty 11.0.24 * Jetty 10.0.24 * Jetty 9.4.56 | |
| Title | Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-11-03T19:34:56.811Z
Reserved: 2024-08-26T15:58:44.006Z
Link: CVE-2024-8184
Updated: 2024-10-15T17:41:57.293Z
Status : Modified
Published: 2024-10-14T16:15:04.380
Modified: 2025-11-03T20:17:04.820
Link: CVE-2024-8184
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA