org.apache.commons:commons-compress@1.14 vulnerabilities
-
latest version
1.27.1
-
latest non vulnerable version
-
first published
15 years ago
-
latest version published
3 months ago
-
licenses detected
- [1.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.commons:commons-compress package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Infinite loop due to the improper handling of certain inputs during the parsing of dump files. An attacker can cause the application to enter an infinite loop by supplying crafted inputs. How to fix Infinite loop? Upgrade |
[1.3,1.26.0)
|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package. How to fix Denial of Service (DoS)? Upgrade |
[1.6,1.21)
|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package. How to fix Denial of Service (DoS)? Upgrade |
[1.1,1.21)
|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package. How to fix Denial of Service (DoS)? Upgrade |
[1.6,1.21)
|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package. How to fix Denial of Service (DoS)? Upgrade |
[1.0,1.21)
|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, the read method might fail to return the correct How to fix Denial of Service (DoS)? Upgrade |
[,1.18-RC1)
|
org.apache.commons:commons-compress defines an API for working with compression and archive formats. Affected versions of this package are vulnerable to Denial of Service (DoS). A specially crafted ZIP archive could be used to cause an infinite loop inside extra field parser used by the How to fix Denial of Service (DoS)? Upgrade |
[1.11,1.16)
|