codehaus-jackson-xc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the codehaus-jackson-xc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Input Validation

<0:1.9.9-12.redhat_6.1.ep6.el7
  • H
Directory Traversal

<0:1.9.9-12.redhat_6.1.ep6.el7
  • H
Deserialization of Untrusted Data

<0:1.9.9-12.redhat_6.1.ep6.el7
  • H
Deserialization of Untrusted Data

<0:1.9.9-12.redhat_6.1.ep6.el7
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:1.9.9-14.redhat_7.1.ep6.el7
  • H
Improper Input Validation

<0:1.9.9-11.redhat_5.1.ep6.el7
  • H
Insufficient Verification of Data Authenticity

<0:1.9.9-10.redhat_4.1.ep6.el7
  • H
Cross-site Scripting (XSS)

<0:1.9.9-10.redhat_4.1.ep6.el7
  • H
Authentication Bypass by Primary Weakness

<0:1.9.9-10.redhat_4.1.ep6.el7
  • H
Improperly Implemented Security Check for Standard

<0:1.9.9-10.redhat_4.1.ep6.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1.9.9-10.redhat_4.1.ep6.el7
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.9.9-10.redhat_4.1.ep6.el7
  • H
Information Exposure

<0:1.9.9-10.redhat_4.1.ep6.el7
  • H
Information Exposure

<0:1.9.9-14.redhat_7.1.ep6.el7
  • H
Incomplete Blacklist

<0:1.9.9-12.redhat_6.1.ep6.el7
  • H
Improper Access Control

<0:1.9.9-12.redhat_6.1.ep6.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.9.9-14.redhat_7.1.ep6.el7
  • H
Incorrect Privilege Assignment

<0:1.9.9-11.redhat_5.1.ep6.el7
  • H
Deserialization of Untrusted Data

<0:1.9.9-12.redhat_6.1.ep6.el7
  • H
Out-of-Bounds

<0:1.9.9-14.redhat_7.1.ep6.el7
  • H
Deserialization of Untrusted Data

<0:1.9.9-11.redhat_5.1.ep6.el7