jbcs-httpd24-runtime vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jbcs-httpd24-runtime package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<0:1-18.jbcs.el7
  • H
Directory Traversal

<0:1-6.jbcs.el7
  • M
Out-of-Bounds

<0:1-3.jbcs.el7
  • M
Improper Input Validation

<0:1-3.jbcs.el7
  • H
Authentication Bypass

<0:1-18.jbcs.el7
  • H
Use After Free

<0:1-18.jbcs.el7
  • H
Information Exposure

<0:1-18.jbcs.el7
  • H
Deserialization of Untrusted Data

<0:1-3.jbcs.el7
  • H
Improper Access Control

<0:1-3.jbcs.el7
  • H
Resource Exhaustion

<0:1-6.jbcs.el7
  • H
Improper Input Validation

<0:1-6.jbcs.el7
  • H
NULL Pointer Dereference

<0:1-6.jbcs.el7
  • H
Improper Input Validation

<0:1-6.jbcs.el7
  • H
Improper Certificate Validation

<0:1-18.jbcs.el7
  • H
Error Handling

<0:1-3.jbcs.el7
  • H
HTTP Request Smuggling

<0:1-3.jbcs.el7
  • H
Improper Input Validation

<0:1-3.jbcs.el7
  • H
Improper Access Control

<0:1-3.jbcs.el7
  • M
Encoding Error

<0:1-3.jbcs.el7
  • H
Uncontrolled Recursion

<0:1-18.jbcs.el7
  • H
Information Exposure

<0:1-18.jbcs.el7
  • H
Out-of-bounds Read

<0:1-6.jbcs.el7
  • H
Authentication Bypass by Primary Weakness

<0:1-6.jbcs.el7
  • H
Out-of-bounds Read

<0:1-6.jbcs.el7
  • H
Uncontrolled Recursion

<0:1-6.jbcs.el7
  • H
Out-of-bounds Write

<0:1-6.jbcs.el7
  • H
Out-of-bounds Write

<0:1-6.jbcs.el7
  • H
Improper Access Control

<0:1-3.jbcs.el7
  • H
Security Features

<0:1-3.jbcs.el7
  • H
Information Exposure

<0:1-3.jbcs.el7
  • H
Information Exposure

<0:1-18.jbcs.el7
  • H
Security Features

<0:1-3.jbcs.el7
  • H
Access Restriction Bypass

<0:1-3.jbcs.el7
  • H
Out-of-Bounds

<0:1-6.jbcs.el7