io.undertow:undertow-core@2.2.27.Final vulnerabilities
-
latest version
2.3.18.Final
-
latest non vulnerable version
-
first published
12 years ago
-
latest version published
a month ago
-
licenses detected
- [1.0.0.Alpha1,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the io.undertow:undertow-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) through the wildfly-http-client protocol, due to the How to fix Denial of Service (DoS)? Upgrade |
[,2.2.31.Final)
[2.3.0.Final,2.3.12.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Race Condition due to the reuse of the This vulnerability primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments. How to fix Race Condition? Upgrade |
[,2.2.36.Final)
[2.3.0.Alpha1,2.3.17.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Memory Leak when the How to fix Memory Leak? Upgrade |
[,2.2.37.Final)
[2.3.0.Alpha1,2.3.18.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Uncontrolled Recursion in chunked response handling. An attacker can cause a client to wait indefinitely by sending excessive data without a Note: This is only exploitable when using How to fix Uncontrolled Recursion? Upgrade |
[,2.2.34.Final)
[2.3.0.Final,2.3.8.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Directory Traversal due to improper input validation of the HTTP request. An attacker can access privileged or restricted files and directories by appending a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP. How to fix Directory Traversal? Upgrade |
[,2.2.33.Final)
[2.3.0.Final,2.3.12.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption through the handling of URL-encoded request path information on How to fix Uncontrolled Resource Consumption? Upgrade |
[,2.2.33.Final)
[2.3.0.Final,2.3.14.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') due to insufficient limitations on the amount of How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')? Upgrade |
[,2.2.33.Final)
[2.3.0.Final,2.3.14.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. An attacker can disrupt service availability by repeatedly sending AJP requests that exceed the configured Note: This is only exploitable if the How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,2.2.31.Final)
[2.3.0.Alpha1,2.3.12.Final)
|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Improper Input Validation via the How to fix Improper Input Validation? Upgrade |
[,2.2.32.Final)
[2.3.0.Alpha1,2.3.13.Final)
|