org.apache.commons:commons-compress@1.22 vulnerabilities
-
latest version
1.26.1
-
latest non vulnerable version
-
first published
15 years ago
-
latest version published
2 months ago
-
licenses detected
- [1.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.commons:commons-compress package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to an How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[1.21,1.26.0)
|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Infinite loop due to the improper handling of certain inputs during the parsing of dump files. An attacker can cause the application to enter an infinite loop by supplying crafted inputs. How to fix Infinite loop? Upgrade |
[1.3,1.26.0)
|
org.apache.commons:commons-compress is an API for working with compression and archive formats. Affected versions of this package are vulnerable to Improper Input Validation when parsing TAR files. An attacker can manipulate file modification times headers, leading to a denial of service issue via CPU consumption. Note: This is only exploitable if applications are using the How to fix Improper Input Validation? Upgrade |
[1.22,1.24.0)
|