Reactor Netty Pivotal Reactor Netty

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Pivotal Reactor Netty.

By the Year

In 2026 there have been 0 vulnerabilities in Pivotal Reactor Netty. Reactor Netty did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 2 7.50
2022 1 4.30
2021 0 0.00
2020 2 6.70
2019 1 8.60

It may take a day or so for new Reactor Netty vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Pivotal Reactor Netty Security Vulnerabilities

Reactor Netty HTTP Server DoS via crafted HTTP requests (before 1.1.13, 1.0.39)
CVE-2023-34054 7.5 - High - November 28, 2023

In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable if Reactor Netty HTTP Server built-in integration with Micrometer is enabled.

Reactor Netty HTTP <1.1.13: Directory Traversal via crafted URL
CVE-2023-34062 7.5 - High - November 15, 2023

In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.

Directory traversal

Reactor Netty 1.0.111.0.23 Header Log Disclosure of Tokens
CVE-2022-31684 4.3 - Medium - October 19, 2022

Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may log request headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled.

Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException
CVE-2020-5403 7.5 - High - March 03, 2020

Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response.

Improper Handling of Exceptional Conditions

The HttpClient from Reactor Netty
CVE-2020-5404 5.9 - Medium - March 03, 2020

The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects.

Insufficiently Protected Credentials

Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones
CVE-2019-11284 8.6 - High - October 17, 2019

Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to.

Insufficiently Protected Credentials

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Pivotal Reactor Netty or by Pivotal? Click the Watch button to subscribe.

Pivotal
Vendor

subscribe