eap7-netty-resolver-dns-classes-macos vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the eap7-netty-resolver-dns-classes-macos package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
SQL Injection

<0:4.1.124-1.Final_redhat_00001.1.el7eap
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.124-1.Final_redhat_00001.1.el7eap
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.124-1.Final_redhat_00001.1.el7eap
  • H
XML External Entity (XXE) Injection

<0:4.1.124-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:4.1.124-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:4.1.124-1.Final_redhat_00001.1.el7eap
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.124-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:4.1.124-1.Final_redhat_00001.1.el7eap
  • H
Stack-based Buffer Overflow

<0:4.1.124-1.Final_redhat_00001.1.el7eap
  • H
Improper Access Control

<0:4.1.119-1.Final_redhat_00004.1.el7eap
  • H
Directory Traversal

<0:4.1.119-1.Final_redhat_00004.1.el7eap
  • H
Resource Exhaustion

<0:4.1.119-1.Final_redhat_00004.1.el7eap
  • H
Improper Input Validation

<0:4.1.119-1.Final_redhat_00004.1.el7eap
  • H
Improper Access Control

<0:4.1.119-1.Final_redhat_00004.1.el7eap
  • H
Resource Exhaustion

<0:4.1.119-1.Final_redhat_00004.1.el7eap
  • H
Uncontrolled Recursion

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Memory Leak

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Improper Input Validation

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:4.1.108-1.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:4.1.94-2.Final_redhat_00003.1.el7eap
  • H
Information Exposure

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Uncontrolled Memory Allocation

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Inefficient Regular Expression Complexity

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Information Exposure Through Server Error Message

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • M
Deserialization of Untrusted Data

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • H
Resource Exhaustion

<0:4.1.94-1.Final_redhat_00001.1.el7eap
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Unchecked Return Value

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Incorrect Authorization

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Memory Leak

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Allocation of Resources Without Limits or Throttling

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Deserialization of Untrusted Data

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • H
Information Exposure

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • M
Deserialization of Untrusted Data

<0:4.1.77-1.Final_redhat_00001.1.el7eap
  • H
Uncontrolled Recursion

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • M
Creation of Temporary File in Directory with Incorrect Permissions

<0:4.1.77-1.Final_redhat_00001.1.el7eap
  • M
HTTP Request Smuggling

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • H
Creation of Temporary File With Insecure Permissions

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • H
Out-of-bounds Write

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • H
Deserialization of Untrusted Data

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • H
Out-of-bounds Write

<0:4.1.86-1.Final_redhat_00001.1.el7eap
  • M
Directory Traversal

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:4.1.77-1.Final_redhat_00001.1.el7eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Improper Handling of Insufficient Permissions or Privileges

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.72-4.Final_redhat_00001.1.el7eap
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.72-4.Final_redhat_00001.1.el7eap