ironjacamar-spec-api-eap6 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ironjacamar-spec-api-eap6 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Information Exposure Through Log Files

<0:1.0.44-1.Final_redhat_00001.1.ep6.el7
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • M
Cross-site Scripting (XSS)

<0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.0.41-1.Final_redhat_1.1.ep6.el7
  • H
Improper Input Validation

<0:1.0.41-1.Final_redhat_1.1.ep6.el7
  • M
Directory Traversal

<0:1.0.39-1.Final_redhat_1.1.ep6.el7
  • C
Missing Authorization

<0:1.0.34-1.Final_redhat_1.1.ep6.el7
  • H
Insufficient Verification of Data Authenticity

<0:1.0.31-1.Final_redhat_1.1.ep6.el7
  • H
Cross-site Scripting (XSS)

<0:1.0.31-1.Final_redhat_1.1.ep6.el7
  • H
Authentication Bypass by Primary Weakness

<0:1.0.31-1.Final_redhat_1.1.ep6.el7
  • H
Improperly Implemented Security Check for Standard

<0:1.0.31-1.Final_redhat_1.1.ep6.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1.0.31-1.Final_redhat_1.1.ep6.el7
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.0.31-1.Final_redhat_1.1.ep6.el7
  • M
Improperly Implemented Security Check for Standard

<0:1.0.36-1.Final_redhat_1.1.ep6.el7
  • H
Information Exposure

<0:1.0.31-1.Final_redhat_1.1.ep6.el7
  • L
Incorrect Privilege Assignment

<0:1.0.27-1.Final_redhat_1.1.ep6.el7
  • H
Information Exposure

<0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • M
Improper Input Validation

<0:1.0.38-3.Final_redhat_3.1.ep6.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • H
Improper Input Validation

<0:1.0.41-1.Final_redhat_1.1.ep6.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:1.0.36-1.Final_redhat_1.1.ep6.el7
  • C
Deserialization of Untrusted Data

<0:1.0.34-1.Final_redhat_1.1.ep6.el7
  • H
CVE-2015-0254

<0:1.0.35-1.Final_redhat_1.1.ep6.el7
  • M
Improper Input Validation

<0:1.0.28-1.Final_redhat_1.1.ep6.el7
  • M
Arbitrary Argument Injection

<0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • H
Out-of-Bounds

<0:1.0.42-2.Final_redhat_2.1.ep6.el7
  • M
Improper Input Validation

<0:1.0.43-1.Final_redhat_1.1.ep6.el7
  • M
Security Features

<0:1.0.39-1.Final_redhat_1.1.ep6.el7
  • M
Security Features

<0:1.0.39-1.Final_redhat_1.1.ep6.el7
  • H
Improper Authorization

<0:1.0.44-1.Final_redhat_00001.1.ep6.el7