httpd24-nghttp2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the httpd24-nghttp2 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Detection of Error Condition Without Action

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

<0:1.7.1-11.el7
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • M
Buffer Overflow

<0:1.7.1-7.el7
  • M
Use After Free

<0:1.7.1-7.el7
  • M
Resource Exhaustion

<0:1.7.1-7.el7
  • M
Improper Input Validation

<0:1.7.1-7.el7
  • M
Integer Overflow or Wraparound

<0:1.7.1-7.el7
  • M
Improper Input Validation

<0:1.7.1-7.el7
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • M
NULL Pointer Dereference

<0:1.7.1-7.el7
  • M
Heap-based Buffer Overflow

<0:1.7.1-7.el7
  • M
Insufficient Session Expiration

<0:1.7.1-8.el7
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • M
Use After Free

<0:1.7.1-6.el7
  • M
Buffer Overflow

<0:1.7.1-8.el7
  • M
Resource Exhaustion

<0:1.7.1-8.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:1.7.1-8.el7.1
  • M
Improper Access Control

<0:1.7.1-8.el7
  • M
Path Equivalence

<0:1.7.1-8.el7
  • H
Resource Exhaustion

<0:1.7.1-7.el7.1
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • H
Resource Exhaustion

<0:1.7.1-7.el7.1
  • H
Resource Exhaustion

<0:1.7.1-7.el7.1
  • M
Incorrect Calculation of Buffer Size

<0:1.7.1-7.el7
  • M
Authentication Bypass by Primary Weakness

<0:1.7.1-7.el7
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • M
Cross-site Scripting (XSS)

<0:1.7.1-8.el7
  • M
Out-of-bounds Write

<0:1.7.1-7.el7
  • M
Information Exposure

<0:1.7.1-7.el7
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • M
Out-of-bounds Write

<0:1.7.1-7.el7
  • M
Out-of-bounds Write

<0:1.7.1-7.el7
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • M
Improper Authentication

<0:1.7.1-7.el7
  • M
Heap-based Buffer Overflow

<0:1.7.1-7.el7
  • M
Out-of-bounds Read

<0:1.7.1-7.el7
  • M
Improper Certificate Validation

<0:1.7.1-7.el7
  • M
Improper Input Validation

<0:1.7.1-7.el7
  • M
Use After Free

<0:1.7.1-7.el7
  • M
Improper Input Validation

<0:1.7.1-7.el7
  • M
Integer Overflow or Wraparound

<0:1.7.1-7.el7
  • M
Use After Free

<0:1.7.1-7.el7
  • M
Out-of-bounds Write

<0:1.7.1-7.el7
  • M
Integer Overflow or Wraparound

<0:1.7.1-7.el7
  • M
Use After Free

<0:1.7.1-7.el7
  • M
Resource Injection

<0:1.7.1-7.el7
  • M
Improper Certificate Validation

<0:1.7.1-7.el7
  • M
Improper Certificate Validation

<0:1.7.1-7.el7