org.apache.tomcat:tomcat-websocket@9.0.43 vulnerabilities
-
latest version
10.1.23
-
latest non vulnerable version
-
first published
11 years ago
-
latest version published
a month ago
-
licenses detected
- [8.0.0-RC1,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.tomcat:tomcat-websocket package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation. Affected versions of this package are vulnerable to Denial of Service (DoS) when a WebSocket client can keep a WebSocket connection open which is leading to increased resource consumption. How to fix Denial of Service (DoS)? Upgrade |
[8.5.0,8.5.99)
[9.0.0-M1,9.0.86)
[10.1.0-M1,10.1.19)
[11.0.0-M1,1.0.0-M17)
|
org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation. Affected versions of this package are vulnerable to Denial of Service (DoS). The fix for previous bug introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an How to fix Denial of Service (DoS)? Upgrade |
[10.1.0-M1,10.1.0-M6)
[10.0.0-M10,10.0.12)
[9.0.40,9.0.54)
[8.5.60,8.5.72)
|