Search for packages
| purl | pkg:maven/org.wildfly/wildfly-undertow@10.1.0.Final |
| Next non-vulnerable version | 12.0.0.Final |
| Latest non-vulnerable version | 12.0.0.Final |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-ay2f-3xcv-dqdc
Aliases: CVE-2016-4993 GHSA-qcqr-hcjq-whfq |
Improper Neutralization of CRLF Sequences in HTTP Headers CRLF injection vulnerability in the Undertow web server allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. |
Affected by 2 other vulnerabilities. Affected by 1 other vulnerability. |
|
VCID-tzmu-y1p4-8bac
Aliases: CVE-2016-9589 GHSA-p4xg-cpr9-vwvj |
Uncontrolled Resource Consumption Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection. |
Affected by 1 other vulnerability. |
|
VCID-zku3-qq4e-7fes
Aliases: CVE-2018-1047 GHSA-fmr4-w67p-vh8x |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||