php:7.4/libzip-tools vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the php:7.4/libzip-tools package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2024-9026

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
CVE-2024-8927

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
CVE-2024-8925

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Insufficient Verification of Data Authenticity

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
CVE-2024-3096

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
CVE-2024-2756

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Out-of-Bounds

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
XML External Entity (XXE) Injection

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Use of Insufficiently Random Values

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Allocation of Resources Without Limits or Throttling

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Use of Password Hash With Insufficient Computational Effort

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
NULL Pointer Dereference

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
Improper Input Validation

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
Reliance on Cookies without Validation and Integrity Checking

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
Inadequate Encryption Strength

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
Use After Free

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • H
Buffer Overflow

<0:1.7.3-1.module_el8.6.0+2739+efabdb8f
  • M
Release of Invalid Pointer or Reference

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
Link Following

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
Use After Free

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
CVE-2021-21707

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
Directory Traversal

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Arbitrary Code Injection

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Deserialization of Untrusted Data

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Improper Input Validation

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
Out-of-bounds Write

<0:1.6.1-1.module_el8.6.0+2750+78feabcb
  • M
Integer Overflow or Wraparound

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
CVE-2022-31631

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Out-of-bounds Read

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
CVE-2022-31629

<0:1.6.1-1.module_el8.6.0+3239+bedf0508
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.6.1-1.module_el8.6.0+3239+bedf0508