2.3.18.Final
11 years ago
2 months ago
Known vulnerabilities in the io.undertow:undertow-servlet package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
io.undertow:undertow-servlet is a Servlet 4.0 implementation for Undertow Affected versions of this package are vulnerable to Memory Allocation with Excessive Size Value due to improper Note:
If the server uses How to fix Memory Allocation with Excessive Size Value? Upgrade | [,2.2.25.Final)[2.3.0,2.3.7.Final) |
io.undertow:undertow-servlet is a Servlet 4.0 implementation for Undertow Affected versions of this package are vulnerable to NULL Pointer Dereference. NullPointerException occurred if a servlet calls How to fix NULL Pointer Dereference? Upgrade | [0,2.0.34.Final)[2.1.0.Final,2.1.6.Final)[2.2.0.Final,2.2.4.Final) |
io.undertow:undertow-servlet is a Servlet 4.0 implementation for Undertow Affected versions of this package are vulnerable to Denial of Service (DoS). Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters. How to fix Denial of Service (DoS)? Upgrade | [,2.0.33.Final)[2.1.0.Final,2.1.5.Final)[2.2.0.Final,2.2.3.Final) |
io.undertow:undertow-servlet is a Servlet 4.0 implementation for Undertow Affected versions of this package are vulnerable to Security Bypass. The How to fix Security Bypass? Upgrade | [,2.1.0.Final) |
io.undertow:undertow-servlet is a Servlet 4.0 implementation for Undertow Affected versions of this package are vulnerable to Information Exposure. Web apps may have their directory structures predicted through requests without trailing slashes via the api. How to fix Information Exposure? Upgrade | [,2.0.23.Final) |
| [1.0.0.Final,1.0.16.Final) |