jbcs-httpd24-apr-util-odbc

Direct Vulnerabilities

Known vulnerabilities in the jbcs-httpd24-apr-util-odbc package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Write

<0:1.6.3-4.el7jbcs
  • H
Incorrect Calculation of Buffer Size

<0:1.6.3-4.el7jbcs
  • H
Authentication Bypass by Primary Weakness

<0:1.6.3-4.el7jbcs
  • H
Improper Neutralization

<0:1.6.3-4.el7jbcs
  • H
Information Exposure

<0:1.6.3-4.el7jbcs
  • H
Integer Overflow or Wraparound

<0:1.6.3-4.el7jbcs
  • H
Directory Traversal

<0:1.6.1-24.jbcs.el7
  • M
Improper Certificate Validation

<0:1.6.1-75.jbcs.el7
  • H
Special Element Injection

<0:1.6.1-101.el7jbcs
  • H
Directory Traversal

<0:1.6.1-101.el7jbcs
  • H
HTTP Response Splitting

<0:1.6.1-101.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<0:1.6.1-101.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<0:1.6.1-101.el7jbcs
  • H
Allocation of Resources Without Limits or Throttling

<0:1.6.1-101.el7jbcs
  • H
Integer Overflow or Wraparound

<0:1.6.1-101.el7jbcs
  • H
Incorrect Type Conversion or Cast

<0:1.6.1-101.el7jbcs
  • H
Use After Free

<0:1.6.1-101.el7jbcs
  • H
Double Free

<0:1.6.1-101.el7jbcs
  • H
Information Exposure

<0:1.6.1-101.el7jbcs
  • H
Out-of-bounds Write

<0:1.6.1-101.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<0:1.6.1-101.el7jbcs
  • H
Use After Free

<0:1.6.1-101.el7jbcs
  • H
HTTP Request Smuggling

<0:1.6.1-91.jbcs.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.6.1-91.jbcs.el7
  • H
Use After Free

<0:1.6.1-91.jbcs.el7
  • H
Authentication Bypass

<0:1.6.1-82.jbcs.el7
  • H
Use After Free

<0:1.6.1-82.jbcs.el7
  • H
Information Exposure

<0:1.6.1-82.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.6.1-84.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<0:1.6.1-75.jbcs.el7
  • M
Incorrect Calculation

<0:1.6.1-9.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-24.jbcs.el7
  • H
Improper Input Validation

<0:1.6.1-24.jbcs.el7
  • H
NULL Pointer Dereference

<0:1.6.1-24.jbcs.el7
  • M
Information Exposure

<0:1.6.1-84.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.6.1-84.jbcs.el7
  • M
Out-of-bounds Read

<0:1.6.1-84.jbcs.el7
  • H
Improper Input Validation

<0:1.6.1-24.jbcs.el7
  • M
Information Exposure

<0:1.6.1-9.jbcs.el7
  • M
Unchecked Error Condition

<0:1.6.1-9.jbcs.el7
  • M
Incorrect Calculation

<0:1.6.1-9.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-9.jbcs.el7
  • M
Resource Exhaustion

<0:1.6.1-75.jbcs.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:1.6.1-75.jbcs.el7
  • H
Insufficient Session Expiration

<0:1.6.1-48.jbcs.el7
  • H
Improper Certificate Validation

<0:1.6.1-82.jbcs.el7
  • H
HTTP Request Smuggling

<0:1.6.1-48.jbcs.el7
  • H
Use After Free

<0:1.6.1-48.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • M
Out-of-bounds Read

<0:1.6.1-9.jbcs.el7
  • M
Out-of-bounds Read

<0:1.6.1-9.jbcs.el7
  • M
Unchecked Error Condition

<0:1.6.1-9.jbcs.el7
  • M
Out-of-bounds Read

<0:1.6.1-9.jbcs.el7
  • L
Use After Free

<0:1.6.1-54.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-91.jbcs.el7
  • H
NULL Pointer Dereference

<0:1.6.1-91.jbcs.el7
  • H
Out-of-bounds Write

<0:1.6.1-91.jbcs.el7
  • H
Use After Free

<0:1.6.1-91.jbcs.el7
  • H
Use After Free

<0:1.6.1-91.jbcs.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.6.1-82.jbcs.el7
  • H
Information Exposure

<0:1.6.1-82.jbcs.el7
  • L
Heap-based Buffer Overflow

<0:1.6.1-54.jbcs.el7
  • H
Improper Access Control

<0:1.6.1-48.jbcs.el7
  • L
Path Equivalence

<0:1.6.1-54.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-75.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • H
Out-of-bounds Read

<0:1.6.1-24.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • H
Authentication Bypass by Primary Weakness

<0:1.6.1-24.jbcs.el7
  • H
Out-of-bounds Read

<0:1.6.1-24.jbcs.el7
  • H
Covert Timing Channel

<0:1.6.1-48.jbcs.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:1.6.1-24.jbcs.el7
  • H
Covert Timing Channel

<0:1.6.1-48.jbcs.el7
  • H
Out-of-bounds Write

<0:1.6.1-24.jbcs.el7
  • H
Out-of-bounds Write

<0:1.6.1-24.jbcs.el7
  • M
Improper Input Validation

<0:1.6.1-84.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-84.jbcs.el7
  • M
Out-of-Bounds

<0:1.6.1-84.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.6.1-84.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.6.1-84.jbcs.el7
  • H
Information Exposure

<0:1.6.1-82.jbcs.el7
  • M
HTTP Response Splitting

<0:1.6.1-9.jbcs.el7
  • M
Out-of-Bounds

<0:1.6.1-84.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-84.jbcs.el7
  • M
Out-of-bounds Read

<0:1.6.1-84.jbcs.el7
  • M
Improper Authentication

<0:1.6.1-84.jbcs.el7
  • H
Information Exposure

<0:1.6.1-48.jbcs.el7
  • H
Out-of-Bounds

<0:1.6.1-24.jbcs.el7