org.apache.tomcat:tomcat-websocket@8.5.64 vulnerabilities
-
latest version
11.0.0
-
latest non vulnerable version
-
first published
11 years ago
-
latest version published
a month ago
-
licenses detected
- [8.0.0-RC1,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.tomcat:tomcat-websocket package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation. Affected versions of this package are vulnerable to Denial of Service (DoS) when a WebSocket client can keep a WebSocket connection open which is leading to increased resource consumption. How to fix Denial of Service (DoS)? Upgrade |
[8.5.0,8.5.99)
[9.0.0-M1,9.0.86)
[10.1.0-M1,10.1.19)
[11.0.0-M1,1.0.0-M17)
|
org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation. Affected versions of this package are vulnerable to Improper Resource Shutdown or Release. When a web application sends a WebSocket message concurrently with the WebSocket connection closing, the application may continue to use the socket after it has been closed. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors. How to fix Improper Resource Shutdown or Release? Upgrade |
[8.5.0,8.5.76)
[9.0.0.M1,9.0.21)
|
org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation. Affected versions of this package are vulnerable to Denial of Service (DoS). The fix for previous bug introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an How to fix Denial of Service (DoS)? Upgrade |
[10.1.0-M1,10.1.0-M6)
[10.0.0-M10,10.0.12)
[9.0.40,9.0.54)
[8.5.60,8.5.72)
|