eap7-velocity vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the eap7-velocity package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Improper Input Validation

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Out-of-bounds Write

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Arbitrary Code Injection

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Uncontrolled Recursion

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Improper Input Validation

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Improper Input Validation

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Improper Input Validation

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Files or Directories Accessible to External Parties

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Static Code Injection

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • C
Static Code Injection

<0:1.7.0-3.redhat_00006.1.ep7.el7
  • H
Information Exposure

<0:2.3.0-1.redhat_00001.1.el7eap
  • M
Information Exposure

<0:2.2.0-1.redhat_00001.1.el7eap
  • M
Improper Authentication

<0:2.2.0-1.redhat_00001.1.el7eap
  • H
Information Exposure

<0:2.3.0-1.redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:2.3.0-1.redhat_00001.1.el7eap
  • H
Cross-site Scripting (XSS)

<0:2.3.0-1.redhat_00001.1.el7eap
  • H
Race Condition

<0:2.3.0-1.redhat_00001.1.el7eap
  • H
Memory Leak

<0:2.3.0-1.redhat_00001.1.el7eap
  • M
Information Exposure

<0:2.0.0-3.redhat_1.2.el7eap
  • M
Improper Input Validation

<0:2.2.0-1.redhat_00001.1.el7eap
  • H
HTTP Request Smuggling

<0:2.3.0-1.redhat_00001.1.el7eap
  • M
HTTP Request Smuggling

<0:2.3.0-1.redhat_00001.1.el7eap
  • M
Information Exposure

<0:2.3.0-1.redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:2.2.0-1.redhat_00001.1.el7eap
  • H
Directory Traversal

<0:2.3.0-1.redhat_00001.1.el7eap
  • C
Arbitrary Command Injection

<0:1.7.0-3.redhat_00006.1.ep7.el7