eap7-jboss-xnio-base vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the eap7-jboss-xnio-base package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Deserialization of Untrusted Data

<0:3.7.13-1.Final_redhat_00001.1.el7eap
  • H
SQL Injection

<0:3.7.13-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:3.7.13-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:3.7.13-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • H
Server-Side Request Forgery (SSRF)

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • H
Server-Side Request Forgery (SSRF)

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • H
Integer Coercion Error

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • H
HTTP Request Smuggling

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • H
Improper Authentication

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • H
Directory Traversal

<0:3.8.12-1.SP2_redhat_00001.1.el7eap
  • H
Uncontrolled Recursion

<0:3.8.16-1.Final_redhat_00001.1.el7eap
  • H
Memory Leak

<0:3.8.16-1.Final_redhat_00001.1.el7eap
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.8.16-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:3.8.16-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:3.8.16-1.Final_redhat_00001.1.el7eap
  • H
Allocation of Resources Without Limits or Throttling

<0:3.8.16-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.8.16-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.8.11-1.SP1_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.8.12-1.SP2_redhat_00001.1.el7eap
  • H
Truncation of Security-relevant Information

<0:3.8.12-1.SP2_redhat_00001.1.el7eap
  • H
HTTP Request Smuggling

<0:3.8.12-1.SP2_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:3.8.12-1.SP2_redhat_00001.1.el7eap
  • H
Improper Initialization

<0:3.8.11-1.SP1_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.8.11-1.SP1_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.8.11-1.SP1_redhat_00001.1.el7eap
  • H
Directory Traversal

<0:3.8.11-1.SP1_redhat_00001.1.el7eap
  • H
Files or Directories Accessible to External Parties

<0:3.8.11-1.SP1_redhat_00001.1.el7eap
  • H
Improper Validation of Syntactic Correctness of Input

<0:3.8.11-1.SP1_redhat_00001.1.el7eap
  • H
Allocation of Resources Without Limits or Throttling

<0:3.8.11-1.SP1_redhat_00001.1.el7eap
  • H
Information Exposure

<0:3.8.10-1.Final_redhat_00001.1.el7eap
  • H
Uncontrolled Memory Allocation

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:3.8.10-1.Final_redhat_00001.1.el7eap
  • H
Inefficient Regular Expression Complexity

<0:3.8.10-1.Final_redhat_00001.1.el7eap
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:3.8.10-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:3.8.10-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Information Exposure Through Log Files

<0:3.7.3-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.3-1.Final_redhat_00001.1.el7eap
  • M
Cross-site Scripting (XSS)

<0:3.6.6-1.Final_redhat_00001.1.el7eap
  • M
Cross-site Scripting (XSS)

<0:3.6.6-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • M
Information Exposure

<0:3.7.9-1.Final_redhat_00001.1.el7eap
  • M
Improper Authentication

<0:3.7.9-1.Final_redhat_00001.1.el7eap
  • H
Memory Leak

<0:3.7.11-1.Final_redhat_00001.1.el7eap
  • H
Directory Traversal

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Improper Authorization

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Exposed Dangerous Method or Function

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Session Fixation

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
HTTP Request Smuggling

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Memory Leak

<0:3.7.12-1.Final_redhat_00001.1.el7eap
  • H
Memory Leak

<0:3.7.12-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:3.7.12-1.Final_redhat_00001.1.el7eap
  • M
Cleartext Transmission of Sensitive Information

<0:3.5.6-1.Final_redhat_00001.1.ep7.el7
  • H
CVE-2017-12189

<0:3.4.7-1.Final_redhat_1.1.ep7.el7
  • H
Insufficient Verification of Data Authenticity

<0:3.4.7-1.Final_redhat_1.1.ep7.el7
  • H
HTTP Request Smuggling

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Incorrect Permission Assignment for Critical Resource

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
HTTP Request Smuggling

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Information Exposure

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Improper Input Validation

<0:3.5.5-1.Final_redhat_1.1.ep7.el7
  • H
Out-of-Bounds

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
HTTP Request Smuggling

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Access Restriction Bypass

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Resource Exhaustion

<0:3.5.10-1.Final_redhat_00001.1.ep7.el7
  • H
Resource Exhaustion

<0:3.7.12-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Cross-site Scripting (XSS)

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
SQL Injection

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • M
Information Exposure Through Log Files

<0:3.6.6-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Deserialization of Untrusted Data

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Information Exposure Through Log Files

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Improper Input Validation

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Improper Access Control

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Resource Exhaustion

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Information Exposure

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Directory Traversal

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
Missing Authorization

<0:3.7.3-1.Final_redhat_00001.1.el7eap
  • H
Authentication Bypass

<0:3.7.6-2.SP1_redhat_00001.1.el7eap
  • H
Improper Access Control

<0:3.7.6-2.SP1_redhat_00001.1.el7eap
  • H
Arbitrary Code Injection

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • M
Information Exposure

<0:3.6.5-1.Final_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Unchecked Return Value

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Incorrect Authorization

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Memory Leak

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Allocation of Resources Without Limits or Throttling

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Deserialization of Untrusted Data

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • H
SQL Injection

<0:3.7.11-1.Final_redhat_00001.1.el7eap
  • M
Improper Input Validation

<0:3.7.9-1.Final_redhat_00001.1.el7eap
  • H
HTTP Request Smuggling

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Improper Resource Shutdown or Release

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Out-of-Bounds

<0:3.7.8-1.SP1_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:3.7.9-1.Final_redhat_00001.1.el7eap
  • M
HTTP Request Smuggling

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Directory Traversal

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Improper Handling of Insufficient Permissions or Privileges

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.8.7-1.SP1_redhat_00001.1.el7eap
  • M
Improper Input Validation

<0:3.4.4-1.Final_redhat_1.1.ep7.el7
  • H
HTTP Response Splitting

<0:3.5.4-1.Final_redhat_1.1.ep7.el7
  • H
HTTP Response Splitting

<0:3.5.5-1.Final_redhat_1.1.ep7.el7
  • H
Improper Input Validation

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Static Code Injection

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Static Code Injection

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
XML External Entity (XXE) Injection

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.5.5-1.Final_redhat_1.1.ep7.el7
  • H
Resource Exhaustion

<0:3.7.6-2.SP1_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.7.6-2.SP1_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.7.6-2.SP1_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:3.7.6-2.SP1_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.3-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.3-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.3-1.Final_redhat_00001.1.el7eap
  • H
Improper Neutralization of Special Elements

<0:3.4.7-1.Final_redhat_1.1.ep7.el7
  • H
CVE-2016-6346

<0:3.4.7-1.Final_redhat_1.1.ep7.el7
  • H
Deserialization of Untrusted Data

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-4.SP3_redhat_00001.1.el7eap
  • H
Information Exposure

<0:3.7.12-1.Final_redhat_00001.1.el7eap
  • H
XML External Entity (XXE) Injection

<0:3.7.11-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:3.7.12-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.6-3.SP2_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:3.7.3-1.Final_redhat_00001.1.el7eap