eap7-netty-all vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the eap7-netty-all package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Improper Input Validation

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • C
Out-of-bounds Write

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • C
Deserialization of Untrusted Data

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • C
Arbitrary Code Injection

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • C
Deserialization of Untrusted Data

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • C
Deserialization of Untrusted Data

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • C
Improper Input Validation

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • C
Improper Input Validation

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • C
Files or Directories Accessible to External Parties

<0:4.1.63-1.Final_redhat_00002.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:4.1.63-1.Final_redhat_00002.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:4.1.63-1.Final_redhat_00002.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:4.1.63-1.Final_redhat_00002.1.ep7.el7
  • C
Deserialization of Untrusted Data

<0:4.1.63-1.Final_redhat_00002.1.ep7.el7
  • H
Deserialization of Untrusted Data

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
SQL Injection

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Deserialization of Untrusted Data

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Improper Input Validation

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Improper Input Validation

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Improper Authorization

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Resource Exhaustion

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Resource Exhaustion

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Resource Exhaustion

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Resource Exhaustion

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Authentication Bypass

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Deserialization of Untrusted Data

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Uncontrolled Recursion

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Memory Leak

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:4.1.94-2.Final_redhat_00003.1.el7eap
  • H
Information Exposure

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Uncontrolled Memory Allocation

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Inefficient Regular Expression Complexity

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Information Exposure Through Log Files

<0:4.1.34-2.Final_redhat_00002.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el7eap
  • H
Information Exposure Through Server Error Message

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • M
Deserialization of Untrusted Data

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:4.1.63-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:4.1.63-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:4.1.63-1.Final_redhat_00001.1.el7eap
  • H
Cross-site Scripting (XSS)

<0:4.1.63-1.Final_redhat_00001.1.el7eap
  • H
Improper Authorization

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
Exposed Dangerous Method or Function

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
Session Fixation

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
HTTP Request Smuggling

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
HTTP Request Smuggling

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
HTTP Request Smuggling

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Information Exposure

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Out-of-Bounds

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
HTTP Request Smuggling

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Access Restriction Bypass

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Resource Exhaustion

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • H
Race Condition

<0:4.1.63-1.Final_redhat_00001.1.el7eap
  • H
Memory Leak

<0:4.1.63-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
Cross-site Scripting (XSS)

<0:4.1.42-1.Final_redhat_00001.1.el7eap
  • H
SQL Injection

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Deserialization of Untrusted Data

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Information Exposure Through Log Files

<0:4.1.42-1.Final_redhat_00001.1.el7eap
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Improper Input Validation

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Improper Access Control

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Resource Exhaustion

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Information Exposure

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Directory Traversal

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Missing Authorization

<0:4.1.34-2.Final_redhat_00002.1.el7eap
  • H
Arbitrary Code Injection

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • M
Information Exposure

<0:4.1.25-2.Final_redhat_00003.1.el7eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Unchecked Return Value

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Incorrect Authorization

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Memory Leak

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Allocation of Resources Without Limits or Throttling

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • C
Deserialization of Untrusted Data

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • H
Information Exposure

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • M
Deserialization of Untrusted Data

<0:4.1.77-1.Final_redhat_00001.1.el7eap
  • H
HTTP Request Smuggling

<0:4.1.45-1.Final_redhat_00001.1.el7eap
  • H
HTTP Request Smuggling

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
HTTP Request Smuggling

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
HTTP Request Smuggling

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • H
Improper Resource Shutdown or Release

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
HTTP Request Smuggling

<0:4.1.63-1.Final_redhat_00001.1.el7eap
  • M
HTTP Request Smuggling

<0:4.1.60-1.Final_redhat_00001.1.el7eap
  • M
Information Exposure

<0:4.1.60-1.Final_redhat_00001.1.el7eap
  • C
Uncontrolled Recursion

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • H
Out-of-Bounds

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • M
Creation of Temporary File With Insecure Permissions

<0:4.1.77-1.Final_redhat_00001.1.el7eap
  • M
HTTP Request Smuggling

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • H
Creation of Temporary File With Insecure Permissions

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • H
Out-of-bounds Write

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • C
Improper Input Validation

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • H
Out-of-bounds Write

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • M
Directory Traversal

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • C
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Improper Handling of Insufficient Permissions or Privileges

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • H
HTTP Response Splitting

<0:4.1.9-1.Final_redhat_1.1.ep7.el7
  • H
Improper Input Validation

<0:4.1.45-1.Final_redhat_00001.1.ep7.el7
  • C
Static Code Injection

<0:4.1.63-1.Final_redhat_00002.1.ep7.el7
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el7eap
  • C
Static Code Injection

<0:4.1.63-1.Final_redhat_00002.1.ep7.el7
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el7eap
  • H
XML External Entity (XXE) Injection

<0:4.1.48-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el7eap
  • H
Directory Traversal

<0:4.1.63-1.Final_redhat_00001.1.el7eap
  • C
Arbitrary Command Injection

<0:4.1.63-4.Final_redhat_00002.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el7eap