The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources.
Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Jun 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache wicket |
|
| CPEs | cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache wicket |
Tue, 04 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 23 Jan 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 23 Jan 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources. Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue. | |
| Title | Apache Wicket: An attacker can intentionally trigger a memory leak | |
| Weaknesses | CWE-400 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published: 2025-01-23T08:37:05.687Z
Updated: 2025-02-04T18:52:25.991Z
Reserved: 2024-11-20T13:50:04.810Z
Link: CVE-2024-53299
Updated: 2025-01-23T18:03:26.240Z
Status : Analyzed
Published: 2025-01-23T09:15:07.033
Modified: 2025-06-27T19:41:44.010
Link: CVE-2024-53299
No data.
ReportizFlow