Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2hcp-gjrf-7fhc | Micronaut Framework vulnerable to a Denial of Service in HTML error response caching |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Objectcomputing
Objectcomputing micronaut |
|
| CPEs | cpe:2.3:a:objectcomputing:micronaut:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Objectcomputing
Objectcomputing micronaut |
Fri, 20 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Micronaut-projects
Micronaut-projects micronaut-core |
|
| Vendors & Products |
Micronaut-projects
Micronaut-projects micronaut-core |
Fri, 20 Mar 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Versions 4.7.0 through 4.10.16 used an unbounded ConcurrentHashMap cache with no eviction policy in its DefaultHtmlErrorResponseBodyProvider. If the application throws an exception whose message may be influenced by an attacker, (for example, including request query value parameters) it could be used by remote attackers to cause an unbounded heap growth and OutOfMemoryError, leading to DoS. This issue has been fixed in version 4.10.7. | |
| Title | Micronaut Framework vulnerable to a Denial of Service in HTML error response caching | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T16:02:36.357Z
Reserved: 2026-03-17T17:22:14.665Z
Link: CVE-2026-33012
Updated: 2026-03-20T16:02:23.985Z
Status : Analyzed
Published: 2026-03-20T05:16:15.200
Modified: 2026-03-24T21:21:44.597
Link: CVE-2026-33012
OpenCVE Enrichment
Updated: 2026-03-20T10:37:18Z
Github GHSA