jbcs-httpd24-openssl

Direct Vulnerabilities

Known vulnerabilities in the jbcs-httpd24-openssl package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Handling of Missing Special Element

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
NULL Pointer Dereference

*
  • L
CVE-2026-28387

*
  • M
Access of Uninitialized Pointer

*
  • M
NULL Pointer Dereference

*
  • L
Missing Required Cryptographic Step

*
  • H
Authentication Bypass by Primary Weakness

<1:1.1.1k-21.el7jbcs
  • H
Improper Neutralization

<1:1.1.1k-21.el7jbcs
  • H
Information Exposure

<1:1.1.1k-21.el7jbcs
  • H
Integer Overflow or Wraparound

<1:1.1.1k-21.el7jbcs
  • M
Improper Handling of Parameters

*
  • L
NULL Pointer Dereference

*
  • L
Missing Required Cryptographic Step

*
  • L
Out-of-bounds Write

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
NULL Pointer Dereference

*
  • L
Improper Validation of Specified Quantity in Input

*
  • L
Improper Validation of Specified Type of Input

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Buffer Overflow

*
  • H
Incorrect Calculation of Buffer Size

<1:1.1.1k-21.el7jbcs
  • L
Out-of-bounds Read

*
  • H
Out-of-bounds Write

<1:1.1.1k-21.el7jbcs
  • L
HTTP Response Splitting

<1:1.1.1k-19.el7jbcs
  • L
NULL Pointer Dereference

<1:1.1.1k-19.el7jbcs
  • L
Covert Timing Channel

*
  • L
Out-of-bounds Write

*
  • L
Improper Certificate Validation

*
  • M
Out-of-Bounds

<1:1.1.1g-8.jbcs.el7
  • M
Out-of-bounds Read

<1:1.1.1g-8.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<1:1.1.1c-32.jbcs.el7
  • L
Use After Free

<1:1.1.1c-4.jbcs.el7
  • H
Use After Free

<1:1.1.1g-11.jbcs.el7
  • H
HTTP Request Smuggling

<1:1.1.1g-11.jbcs.el7
  • H
Out-of-bounds Write

<1:1.1.1g-11.jbcs.el7
  • L
Information Exposure

<1:1.1.1k-19.el7jbcs
  • L
Use After Free

*
  • M
Cross-site Scripting (XSS)

<1:1.1.1k-17.el7jbcs
  • M
Missing Encryption of Sensitive Data

<1:1.1.1k-17.el7jbcs
  • M
Information Exposure

<1:1.1.1k-17.el7jbcs
  • M
Out-of-bounds Read

<1:1.1.1k-17.el7jbcs
  • H
Resource Exhaustion

<1:1.1.1k-16.el7jbcs
  • H
Information Exposure

<1:1.1.1k-16.el7jbcs
  • H
External Control of File Name or Path

<1:1.1.1k-16.el7jbcs
  • H
Out-of-Bounds

<1:1.1.1k-16.el7jbcs
  • H
Allocation of Resources Without Limits or Throttling

<1:1.1.1k-16.el7jbcs
  • M
Missing Required Cryptographic Step

<1:1.1.1k-17.el7jbcs
  • H
Excessive Iteration

<1:1.1.1k-16.el7jbcs
  • H
Resource Exhaustion

<1:1.1.1k-16.el7jbcs
  • H
Resource Exhaustion

<1:1.1.1k-16.el7jbcs
  • H
Improper Certificate Validation

<1:1.1.1k-16.el7jbcs
  • H
Improper Certificate Validation

<1:1.1.1k-16.el7jbcs
  • H
Directory Traversal

<1:1.0.2n-14.jbcs.el7
  • H
Out-of-Bounds

<1:1.0.2h-12.jbcs.el7
  • M
Out-of-Bounds

<1:1.0.2h-4.jbcs.el7
  • M
Improper Input Validation

<1:1.0.2h-4.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2h-12.jbcs.el7
  • H
Buffer Overflow

<1:1.0.2h-12.jbcs.el7
  • M
Improper Certificate Validation

<1:1.1.1c-32.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1k-16.el7jbcs
  • H
Special Element Injection

<1:1.1.1k-14.el7jbcs
  • H
Directory Traversal

<1:1.1.1k-14.el7jbcs
  • H
HTTP Response Splitting

<1:1.1.1k-14.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<1:1.1.1k-14.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<1:1.1.1k-14.el7jbcs
  • H
Allocation of Resources Without Limits or Throttling

<1:1.1.1k-14.el7jbcs
  • H
Integer Overflow or Wraparound

<1:1.1.1k-14.el7jbcs
  • H
Incorrect Type Conversion or Cast

<1:1.1.1k-14.el7jbcs
  • H
Use After Free

<1:1.1.1k-14.el7jbcs
  • H
Double Free

<1:1.1.1k-14.el7jbcs
  • H
Information Exposure

<1:1.1.1k-14.el7jbcs
  • H
Out-of-bounds Write

<1:1.1.1k-14.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<1:1.1.1k-14.el7jbcs
  • H
Use After Free

<1:1.1.1k-14.el7jbcs
  • M
Cleartext Transmission of Sensitive Information

<1:1.1.1k-13.el7jbcs
  • M
Double Free

<1:1.1.1k-13.el7jbcs
  • M
Expected Behavior Violation

<1:1.1.1k-13.el7jbcs
  • M
Improper Validation of Syntactic Correctness of Input

<1:1.1.1k-13.el7jbcs
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<1:1.1.1k-13.el7jbcs
  • M
Allocation of Resources Without Limits or Throttling

<1:1.1.1k-13.el7jbcs
  • M
Improper Preservation of Permissions

<1:1.1.1k-13.el7jbcs
  • M
Arbitrary Command Injection

<1:1.1.1k-13.el7jbcs
  • M
HTTP Request Smuggling

<1:1.1.1k-13.el7jbcs
  • M
Allocation of Resources Without Limits or Throttling

<1:1.1.1k-13.el7jbcs
  • M
Integer Overflow or Wraparound

<1:1.1.1k-13.el7jbcs
  • M
Integer Overflow or Wraparound

<1:1.1.1k-13.el7jbcs
  • M
HTTP Request Smuggling

<1:1.1.1k-13.el7jbcs
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:1.1.1k-13.el7jbcs
  • M
Arbitrary Command Injection

<1:1.1.1k-13.el7jbcs
  • M
Out-of-bounds Write

<1:1.1.1k-13.el7jbcs
  • H
HTTP Request Smuggling

<1:1.1.1g-11.jbcs.el7
  • M
Out-of-bounds Write

<1:1.1.1k-13.el7jbcs
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:1.1.1g-11.jbcs.el7
  • H
Use After Free

<1:1.1.1g-11.jbcs.el7
  • M
NULL Pointer Dereference

<1:1.1.1g-8.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<1:1.1.1c-32.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2h-13.jbcs.el7
  • M
Incorrect Calculation

<1:1.0.2n-11.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2n-14.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2n-14.jbcs.el7
  • H
NULL Pointer Dereference

<1:1.0.2n-14.jbcs.el7
  • M
Information Exposure

<1:1.1.1g-8.jbcs.el7
  • M
NULL Pointer Dereference

<1:1.1.1g-8.jbcs.el7
  • M
Out-of-bounds Read

<1:1.1.1g-8.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2n-14.jbcs.el7
  • M
Information Exposure

<1:1.0.2n-11.jbcs.el7
  • M
Unchecked Error Condition

<1:1.0.2n-11.jbcs.el7
  • M
Incorrect Calculation

<1:1.0.2n-11.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.0.2n-11.jbcs.el7
  • M
Resource Exhaustion

<1:1.1.1c-32.jbcs.el7
  • M
Out-of-Bounds

<1:1.1.1c-32.jbcs.el7
  • H
Insufficient Session Expiration

<1:1.1.1-25.jbcs.el7
  • H
Use After Free

<1:1.0.2h-14.jbcs.el7
  • H
Missing Initialization of a Variable

<1:1.0.2h-14.jbcs.el7
  • H
Missing Initialization of a Variable

<1:1.0.2h-14.jbcs.el7
  • H
Improper Certificate Validation

<1:1.1.1g-6.jbcs.el7
  • H
NULL Pointer Dereference

<1:1.1.1g-6.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2h-13.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2h-13.jbcs.el7
  • H
Improper Authentication

<1:1.0.2h-13.jbcs.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:1.0.2h-14.jbcs.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:1.0.2h-14.jbcs.el7
  • M
Open Redirect

<1:1.1.1c-16.jbcs.el7
  • M
Resource Exhaustion

<1:1.1.1c-16.jbcs.el7
  • H
HTTP Request Smuggling

<1:1.1.1-25.jbcs.el7
  • M
Use After Free

<1:1.1.1c-16.jbcs.el7
  • H
Use After Free

<1:1.1.1-25.jbcs.el7
  • M
Buffer Overflow

<1:1.1.1c-16.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.0.2n-11.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2h-13.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2h-13.jbcs.el7
  • H
Integer Overflow or Wraparound

<1:1.0.2h-13.jbcs.el7
  • H
Integer Overflow or Wraparound

<1:1.0.2h-12.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2h-13.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2h-13.jbcs.el7
  • M
Out-of-bounds Read

<1:1.0.2n-11.jbcs.el7
  • H
Covert Timing Channel

<1:1.0.2h-12.jbcs.el7
  • H
Covert Timing Channel

<1:1.0.2h-13.jbcs.el7
  • M
Unchecked Error Condition

<1:1.0.2n-11.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.0.2n-11.jbcs.el7
  • H
Out-of-bounds Write

<1:1.0.2h-12.jbcs.el7
  • H
Improper Authentication

<1:1.0.2h-14.jbcs.el7
  • M
Encoding Error

<1:1.0.2h-4.jbcs.el7
  • L
Use After Free

<1:1.1.1c-4.jbcs.el7
  • M
Information Exposure

<1:1.1.1c-16.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1g-11.jbcs.el7
  • L
NULL Pointer Dereference

<1:1.1.1g-3.jbcs.el7
  • H
NULL Pointer Dereference

<1:1.1.1g-11.jbcs.el7
  • H
Out-of-bounds Write

<1:1.1.1g-11.jbcs.el7
  • H
Use After Free

<1:1.1.1g-11.jbcs.el7
  • H
Use After Free

<1:1.1.1g-11.jbcs.el7
  • L
Heap-based Buffer Overflow

<1:1.1.1c-4.jbcs.el7
  • M
Open Redirect

<1:1.1.1c-16.jbcs.el7
  • H
Improper Access Control

<1:1.1.1-25.jbcs.el7
  • L
Path Equivalence

<1:1.1.1c-4.jbcs.el7
  • M
Information Exposure

<1:1.1.1c-16.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.1.1c-32.jbcs.el7
  • M
Client-Side Enforcement of Server-Side Security

<1:1.1.1c-16.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • H
Out-of-bounds Read

<1:1.0.2n-14.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • H
Authentication Bypass by Primary Weakness

<1:1.0.2n-14.jbcs.el7
  • H
Out-of-bounds Read

<1:1.0.2n-14.jbcs.el7
  • M
Cross-site Scripting (XSS)

<1:1.1.1c-16.jbcs.el7
  • H
Covert Timing Channel

<1:1.1.1-25.jbcs.el7
  • H
Uncontrolled Recursion

<1:1.0.2n-14.jbcs.el7
  • H
Information Exposure

<1:1.0.2n-15.jbcs.el7
  • H
Covert Timing Channel

<1:1.1.1-25.jbcs.el7
  • H
Missing Required Cryptographic Step

<1:1.0.2n-15.jbcs.el7
  • L
Out-of-bounds Read

*
  • H
Out-of-bounds Write

<1:1.0.2n-14.jbcs.el7
  • H
Out-of-bounds Write

<1:1.0.2n-14.jbcs.el7
  • H
Execution with Unnecessary Privileges

<1:1.0.2n-15.jbcs.el7
  • M
Improper Input Validation

<1:1.1.1g-8.jbcs.el7
  • H
Covert Timing Channel

<1:1.0.2h-13.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.1.1g-8.jbcs.el7
  • M
Out-of-Bounds

<1:1.1.1g-8.jbcs.el7
  • M
NULL Pointer Dereference

<1:1.1.1g-8.jbcs.el7
  • M
NULL Pointer Dereference

<1:1.1.1g-8.jbcs.el7
  • M
HTTP Response Splitting

<1:1.0.2n-11.jbcs.el7
  • M
Out-of-Bounds

<1:1.1.1g-8.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.1.1g-8.jbcs.el7
  • M
Out-of-bounds Read

<1:1.1.1g-8.jbcs.el7
  • M
Improper Authentication

<1:1.1.1g-8.jbcs.el7
  • M
Missing Required Cryptographic Step

*
  • H
Information Exposure

<1:1.1.1-25.jbcs.el7
  • H
Out-of-Bounds

<1:1.0.2n-14.jbcs.el7