io.undertow%3Aundertow-core@2.2.7.Final vulnerabilities
-
latest version
2.3.13.Final
-
latest non vulnerable version
-
first published
11 years ago
-
latest version published
2 months ago
-
licenses detected
- [1.0.0.Alpha1,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the io.undertow%3Aundertow-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. An attacker can disrupt service availability by repeatedly sending AJP requests that exceed the configured Note: This is only exploitable if the How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,2.2.31.Final)
[2.3.0.Alpha1,2.3.12.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Improper Input Validation via the How to fix Improper Input Validation? Upgrade |
[,2.2.32.Final)
[2.3.0.Alpha1,2.3.13.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) in flow control handling by the browser over HTTP/2. This may cause overhead or a denial of service in the server. This is due to an incomplete fix of CVE-2021-3629. How to fix Denial of Service (DoS)? Upgrade |
[0,2.2.25.Final)
[2.3.0.Alpha1,2.3.6.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Improper Certificate Validation via the undertow client which does not check the server identity presented by the server certificate in https connections. How to fix Improper Certificate Validation? Upgrade |
[0,2.2.24.Final)
[2.3.0.Alpha1,2.3.5.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) via an AJP 400 response, when EAP 7 is improperly sending two response packets, those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by How to fix Denial of Service (DoS)? Upgrade |
[,2.2.18)
[2.3.0.Alpha1,2.3.0.Alpha2)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) when a How to fix Denial of Service (DoS)? Upgrade |
[,2.2.19.Final)
[2.3.0.Alpha1,2.3.0.Alpha2)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) due to an issue in the flow control handling by the browser over How to fix Denial of Service (DoS)? Upgrade |
[,2.0.40.Final)
[2.1.0.Final,2.2.11.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) which would cause client side invocation timeout with certain calls made over HTTP2. How to fix Denial of Service (DoS)? Upgrade |
[0,2.2.15.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) due to final frame write failure in How to fix Denial of Service (DoS)? Upgrade |
[0,2.2.8.Final)
|