hiera vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the hiera package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
SQL Injection

<0:1.3.1-2.el7sat
  • H
Cleartext Storage of Sensitive Information

<0:1.3.1-2.el7sat
  • H
Insufficient Verification of Data Authenticity

<0:1.3.1-2.el7sat
  • H
Deserialization of Untrusted Data

<0:1.3.1-2.el7sat
  • H
Improper Input Validation

<0:1.3.1-2.el7sat
  • H
Insecure Temporary File

<0:1.3.1-2.el7sat
  • H
Insufficiently Protected Credentials

<0:1.3.1-2.el7sat
  • H
Cross-site Scripting (XSS)

<0:1.3.1-2.el7sat
  • H
Cross-site Scripting (XSS)

<0:1.3.1-2.el7sat
  • H
Cross-site Scripting (XSS)

<0:1.3.1-2.el7sat
  • H
Improper Authorization

<0:1.3.1-2.el7sat
  • H
Improper Authorization

<0:1.3.1-2.el7sat
  • H
Cross-site Scripting (XSS)

<0:1.3.1-2.el7sat
  • H
Information Exposure Through Log Files

<0:1.3.1-2.el7sat
  • H
Information Exposure

<0:1.3.1-2.el7sat
  • H
Improper Access Control

<0:1.3.1-2.el7sat
  • H
Use of Insufficiently Random Values

<0:1.3.1-2.el7sat
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.3.1-2.el7sat
  • H
Improper Input Validation

<0:1.3.1-2.el7sat
  • H
Improper Access Control

<0:1.3.1-2.el7sat
  • H
Cross-site Scripting (XSS)

<0:1.3.1-2.el7sat
  • M
CVE-2013-6668

<0:1.3.1-2.el7sat
  • M
Information Exposure

<0:1.3.1-2.el7sat
  • M
Improper Input Validation

<0:1.3.1-2.el7sat
  • M
Omission of Security-relevant Information

<0:1.3.1-2.el7sat
  • H
Integer Overflow or Wraparound

<0:1.3.1-2.el7sat
  • M
Resource Exhaustion

<0:1.3.1-2.el7sat
  • M
Access Restriction Bypass

<0:1.3.1-2.el7sat
  • M
Improper Data Handling

<0:1.3.1-2.el7sat
  • M
Improper Data Handling

<0:1.3.1-2.el7sat
  • M
Algorithmic Complexity

<0:1.3.1-2.el7sat