org.apache.tomcat:tomcat-websocket@10.0.0-M10 vulnerabilities
-
latest version
10.1.20
-
latest non vulnerable version
-
first published
11 years ago
-
latest version published
a month ago
-
licenses detected
- [8.0.0-RC1,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.tomcat:tomcat-websocket package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation. Affected versions of this package are vulnerable to Denial of Service (DoS). The fix for previous bug introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an How to fix Denial of Service (DoS)? Upgrade |
[10.1.0-M1,10.1.0-M6)
[10.0.0-M10,10.0.12)
[9.0.40,9.0.54)
[8.5.60,8.5.72)
|
org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation. Affected versions of this package are vulnerable to Denial of Service (DoS). The payload length in a WebSocket frame was not correctly validated. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service. How to fix Denial of Service (DoS)? Upgrade |
[10.0.0-M1,10.0.0-M7)
[9.0.0.M1,9.0.37)
[8.5.0,8.5.57)
|