Undertow is a flexible performant web server written in java providing both blocking and non-blocking APIs based on NIO.rnrnUndertow has a composition based architecture that allows you to build a web server by combining small single purpose handlers. The gives you the flexibility to choose between a full Java EE servlet 4.0 container or a low level non-blocking handler to anything in between.
Undertow Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Critical
Undertow Insertion of Sensitive Information into Log File Vulnerability
Critical
Undertow Insertion of Sensitive Information into Log File Vulnerability
Critical
Undertow Vulnerability
Critical
Undertow Vulnerability
High
Undertow Missing Authorization Vulnerability
High
Undertow Uncontrolled Resource Consumption Vulnerability
High
Undertow Uncontrolled Resource Consumption Vulnerability
High
Undertow Unchecked Return Value Vulnerability
High
Undertow Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
High
Undertow Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
High
Undertow Improper Input Validation Vulnerability
High
Undertow Uncontrolled Resource Consumption Vulnerability
High
Undertow Uncontrolled Resource Consumption Vulnerability
High
Undertow Vulnerability
High
Undertow Exposure of Resource to Wrong Sphere Vulnerability
High
Undertow Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
High
Undertow Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
High
Undertow Uncontrolled Resource Consumption Vulnerability
High
Undertow Vulnerability
Medium
Undertow Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Medium
Undertow Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
Medium
Undertow Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Medium
Undertow Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Medium
Undertow Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Medium
Undertow Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Response Splitting) Vulnerability
Medium
Undertow Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
Medium
Undertow Incorrect Authorization Vulnerability
Medium