eap7-hibernate-envers vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the eap7-hibernate-envers package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Directory Traversal

<0:5.3.37-1.Final_redhat_00001.1.el9eap
  • H
Directory Traversal

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • H
Resource Exhaustion

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Resource Exhaustion

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • H
Truncation of Security-relevant Information

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • H
HTTP Request Smuggling

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • H
Improper Input Validation

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • M
Link Following

<0:5.3.33-2.Final_redhat_00001.1.el9eap
  • M
Information Exposure Through Log Files

<0:5.3.33-2.Final_redhat_00001.1.el9eap
  • H
Improper Initialization

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Resource Exhaustion

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Deserialization of Untrusted Data

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Directory Traversal

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Files or Directories Accessible to External Parties

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Improper Validation of Syntactic Correctness of Input

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Allocation of Resources Without Limits or Throttling

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Information Exposure

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Uncontrolled Memory Allocation

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Allocation of Resources Without Limits or Throttling

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Inefficient Regular Expression Complexity

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Information Exposure

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Resource Exhaustion

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • M
Deserialization of Untrusted Data

<0:5.3.27-1.Final_redhat_00001.1.el9eap
  • M
Creation of Temporary File With Insecure Permissions

<0:5.3.27-1.Final_redhat_00001.1.el9eap
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:5.3.27-1.Final_redhat_00001.1.el9eap