jbcs-httpd24-apr-util-openssl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jbcs-httpd24-apr-util-openssl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<0:1.6.1-82.jbcs.el7
  • M
Out-of-Bounds

<0:1.6.1-84.jbcs.el7
  • M
Out-of-bounds Read

<0:1.6.1-84.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<0:1.6.1-75.jbcs.el7
  • L
Use After Free

<0:1.6.1-54.jbcs.el7
  • H
Use After Free

<0:1.6.1-91.jbcs.el7
  • H
HTTP Request Smuggling

<0:1.6.1-91.jbcs.el7
  • H
Out-of-bounds Write

<0:1.6.1-91.jbcs.el7
  • H
Directory Traversal

<0:1.6.1-24.jbcs.el7
  • M
Improper Certificate Validation

<0:1.6.1-75.jbcs.el7
  • H
Special Element Injection

<0:1.6.1-101.el7jbcs
  • H
Directory Traversal

<0:1.6.1-101.el7jbcs
  • H
HTTP Response Splitting

<0:1.6.1-101.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<0:1.6.1-101.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<0:1.6.1-101.el7jbcs
  • H
Allocation of Resources Without Limits or Throttling

<0:1.6.1-101.el7jbcs
  • H
Integer Overflow or Wraparound

<0:1.6.1-101.el7jbcs
  • H
Incorrect Type Conversion or Cast

<0:1.6.1-101.el7jbcs
  • H
Use After Free

<0:1.6.1-101.el7jbcs
  • H
Double Free

<0:1.6.1-101.el7jbcs
  • H
Information Exposure

<0:1.6.1-101.el7jbcs
  • H
Out-of-bounds Read

<0:1.6.1-101.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<0:1.6.1-101.el7jbcs
  • H
Use After Free

<0:1.6.1-101.el7jbcs
  • H
HTTP Request Smuggling

<0:1.6.1-91.jbcs.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.6.1-91.jbcs.el7
  • H
Use After Free

<0:1.6.1-91.jbcs.el7
  • H
Authentication Bypass

<0:1.6.1-82.jbcs.el7
  • H
Use After Free

<0:1.6.1-82.jbcs.el7
  • H
Information Exposure

<0:1.6.1-82.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.6.1-84.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<0:1.6.1-75.jbcs.el7
  • M
Incorrect Calculation

<0:1.6.1-9.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-24.jbcs.el7
  • H
Improper Input Validation

<0:1.6.1-24.jbcs.el7
  • H
NULL Pointer Dereference

<0:1.6.1-24.jbcs.el7
  • M
Information Exposure

<0:1.6.1-84.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.6.1-84.jbcs.el7
  • M
Out-of-bounds Read

<0:1.6.1-84.jbcs.el7
  • H
Improper Input Validation

<0:1.6.1-24.jbcs.el7
  • M
Information Exposure

<0:1.6.1-9.jbcs.el7
  • M
Unchecked Error Condition

<0:1.6.1-9.jbcs.el7
  • M
Incorrect Calculation

<0:1.6.1-9.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-9.jbcs.el7
  • M
Resource Exhaustion

<0:1.6.1-75.jbcs.el7
  • M
Out-of-Bounds

<0:1.6.1-75.jbcs.el7
  • H
Insufficient Session Expiration

<0:1.6.1-48.jbcs.el7
  • H
Improper Certificate Validation

<0:1.6.1-82.jbcs.el7
  • H
HTTP Request Smuggling

<0:1.6.1-48.jbcs.el7
  • H
Use After Free

<0:1.6.1-48.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-9.jbcs.el7
  • M
Out-of-bounds Read

<0:1.6.1-9.jbcs.el7
  • M
Unchecked Error Condition

<0:1.6.1-9.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-9.jbcs.el7
  • L
Use After Free

<0:1.6.1-54.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-91.jbcs.el7
  • H
NULL Pointer Dereference

<0:1.6.1-91.jbcs.el7
  • H
Out-of-bounds Write

<0:1.6.1-91.jbcs.el7
  • H
Use After Free

<0:1.6.1-91.jbcs.el7
  • H
Use After Free

<0:1.6.1-91.jbcs.el7
  • H
Uncontrolled Recursion

<0:1.6.1-82.jbcs.el7
  • H
Information Exposure

<0:1.6.1-82.jbcs.el7
  • L
Heap-based Buffer Overflow

<0:1.6.1-54.jbcs.el7
  • H
Improper Access Control

<0:1.6.1-48.jbcs.el7
  • L
Path Equivalence

<0:1.6.1-54.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-75.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • H
Out-of-bounds Read

<0:1.6.1-24.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • H
Resource Exhaustion

<0:1.6.1-48.jbcs.el7
  • H
Authentication Bypass by Primary Weakness

<0:1.6.1-24.jbcs.el7
  • H
Out-of-bounds Read

<0:1.6.1-24.jbcs.el7
  • H
Covert Timing Channel

<0:1.6.1-48.jbcs.el7
  • H
Uncontrolled Recursion

<0:1.6.1-24.jbcs.el7
  • H
Covert Timing Channel

<0:1.6.1-48.jbcs.el7
  • H
Out-of-bounds Write

<0:1.6.1-24.jbcs.el7
  • H
Out-of-bounds Write

<0:1.6.1-24.jbcs.el7
  • M
Improper Input Validation

<0:1.6.1-84.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-84.jbcs.el7
  • M
Out-of-Bounds

<0:1.6.1-84.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.6.1-84.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.6.1-84.jbcs.el7
  • H
Information Exposure

<0:1.6.1-82.jbcs.el7
  • M
HTTP Response Splitting

<0:1.6.1-9.jbcs.el7
  • M
Out-of-Bounds

<0:1.6.1-84.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.6.1-84.jbcs.el7
  • M
Out-of-bounds Read

<0:1.6.1-84.jbcs.el7
  • M
Improper Authentication

<0:1.6.1-84.jbcs.el7
  • H
Information Exposure

<0:1.6.1-48.jbcs.el7
  • H
Out-of-Bounds

<0:1.6.1-24.jbcs.el7