jbcs-httpd24-curl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jbcs-httpd24-curl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<0:7.77.0-2.jbcs.el7
  • M
Detection of Error Condition Without Action

<0:8.7.1-2.el7jbcs
  • M
Resource Exhaustion

<0:8.7.1-2.el7jbcs
  • M
Improper Validation of Certificate with Host Mismatch

<0:8.7.1-2.el7jbcs
  • M
Missing Release of Resource after Effective Lifetime

<0:8.7.1-2.el7jbcs
  • M
Improper Certificate Validation

<0:8.7.1-2.el7jbcs
  • M
Misinterpretation of Input

<0:8.7.1-2.el7jbcs
  • M
Out-of-Bounds

<0:7.78.0-2.jbcs.el7
  • M
Out-of-bounds Read

<0:7.78.0-2.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<0:7.64.1-44.jbcs.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:7.64.1-36.jbcs.el7
  • L
Use After Free

<0:7.64.1-21.jbcs.el7
  • H
Use After Free

<0:7.78.0-3.jbcs.el7
  • H
HTTP Request Smuggling

<0:7.78.0-3.jbcs.el7
  • H
Out-of-bounds Write

<0:7.78.0-3.jbcs.el7
  • M
Detection of Error Condition Without Action

<0:8.7.1-2.el7jbcs
  • M
Resource Exhaustion

<0:8.7.1-2.el7jbcs
  • M
Improper Validation of Certificate with Host Mismatch

<0:8.7.1-2.el7jbcs
  • M
Missing Release of Resource after Effective Lifetime

<0:8.7.1-2.el7jbcs
  • M
Improper Certificate Validation

<0:8.7.1-2.el7jbcs
  • M
Misinterpretation of Input

<0:8.7.1-2.el7jbcs
  • M
Cross-site Scripting (XSS)

<0:8.6.0-3.el7jbcs
  • M
Missing Required Cryptographic Step

<0:8.6.0-3.el7jbcs
  • M
Missing Encryption of Sensitive Data

<0:8.6.0-3.el7jbcs
  • M
Information Exposure

<0:8.6.0-3.el7jbcs
  • M
Out-of-bounds Read

<0:8.6.0-3.el7jbcs
  • H
Resource Exhaustion

<0:8.4.0-2.el7jbcs
  • H
Information Exposure

<0:8.4.0-2.el7jbcs
  • H
External Control of File Name or Path

<0:8.4.0-2.el7jbcs
  • H
Out-of-Bounds

<0:8.4.0-2.el7jbcs
  • H
Excessive Iteration

<0:8.4.0-2.el7jbcs
  • H
Allocation of Resources Without Limits or Throttling

<0:8.4.0-2.el7jbcs
  • H
Resource Exhaustion

<0:8.4.0-2.el7jbcs
  • H
Resource Exhaustion

<0:8.4.0-2.el7jbcs
  • H
Improper Certificate Validation

<0:8.4.0-2.el7jbcs
  • H
Improper Certificate Validation

<0:8.4.0-2.el7jbcs
  • H
Resource Exhaustion

<0:8.4.0-2.el7jbcs
  • M
Expected Behavior Violation

<0:8.2.1-1.el7jbcs
  • M
Use After Free

<0:8.2.1-1.el7jbcs
  • M
Improper Certificate Validation

<0:8.2.1-1.el7jbcs
  • M
Improper Certificate Validation

<0:7.64.1-44.jbcs.el7
  • H
Special Element Injection

<0:8.0.1-1.el7jbcs
  • H
Directory Traversal

<0:8.0.1-1.el7jbcs
  • M
HTTP Response Splitting

<0:8.2.1-1.el7jbcs
  • H
HTTP Response Splitting

<0:8.0.1-1.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.1-1.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.1-1.el7jbcs
  • H
Allocation of Resources Without Limits or Throttling

<0:8.0.1-1.el7jbcs
  • M
Integer Overflow or Wraparound

<0:8.2.1-1.el7jbcs
  • H
Integer Overflow or Wraparound

<0:8.0.1-1.el7jbcs
  • H
Incorrect Type Conversion or Cast

<0:8.0.1-1.el7jbcs
  • H
Use After Free

<0:8.0.1-1.el7jbcs
  • H
Double Free

<0:8.0.1-1.el7jbcs
  • H
Information Exposure

<0:8.0.1-1.el7jbcs
  • M
Resource Leak

<0:8.2.1-1.el7jbcs
  • M
CVE-2022-48279

<0:8.2.1-1.el7jbcs
  • M
HTTP Response Splitting

<0:8.2.1-1.el7jbcs
  • M
HTTP Request Smuggling

<0:8.2.1-1.el7jbcs
  • H
Out-of-bounds Read

<0:8.0.1-1.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<0:8.0.1-1.el7jbcs
  • H
Use After Free

<0:8.0.1-1.el7jbcs
  • M
Cleartext Transmission of Sensitive Information

<0:7.86.0-2.el7jbcs
  • M
Double Free

<0:7.86.0-2.el7jbcs
  • M
Expected Behavior Violation

<0:7.86.0-2.el7jbcs
  • M
Improper Validation of Syntactic Correctness of Input

<0:7.86.0-2.el7jbcs
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.86.0-2.el7jbcs
  • M
Allocation of Resources Without Limits or Throttling

<0:7.86.0-2.el7jbcs
  • M
Improper Preservation of Permissions

<0:7.86.0-2.el7jbcs
  • M
Arbitrary Command Injection

<0:7.86.0-2.el7jbcs
  • M
Insufficient Verification of Data Authenticity

<0:7.86.0-2.el7jbcs
  • M
Allocation of Resources Without Limits or Throttling

<0:7.86.0-2.el7jbcs
  • M
Integer Overflow or Wraparound

<0:7.86.0-2.el7jbcs
  • M
Integer Overflow or Wraparound

<0:7.86.0-2.el7jbcs
  • M
HTTP Request Smuggling

<0:7.86.0-2.el7jbcs
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:7.86.0-2.el7jbcs
  • M
Arbitrary Command Injection

<0:7.86.0-2.el7jbcs
  • M
Integer Overflow or Wraparound

<0:7.86.0-2.el7jbcs
  • H
HTTP Request Smuggling

<0:7.78.0-3.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:7.86.0-2.el7jbcs
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:7.78.0-3.jbcs.el7
  • H
Use After Free

<0:7.78.0-3.jbcs.el7
  • H
Authentication Bypass

<0:7.77.0-2.jbcs.el7
  • H
Use After Free

<0:7.77.0-2.jbcs.el7
  • H
Information Exposure

<0:7.77.0-2.jbcs.el7
  • M
NULL Pointer Dereference

<0:7.78.0-2.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<0:7.64.1-44.jbcs.el7
  • M
Information Exposure

<0:7.78.0-2.jbcs.el7
  • M
NULL Pointer Dereference

<0:7.78.0-2.jbcs.el7
  • M
Out-of-bounds Read

<0:7.78.0-2.jbcs.el7
  • M
Resource Exhaustion

<0:7.64.1-44.jbcs.el7
  • M
Out-of-Bounds

<0:7.64.1-44.jbcs.el7
  • H
Insufficient Session Expiration

<0:7.64.1-14.jbcs.el7
  • H
Improper Certificate Validation

<0:7.77.0-2.jbcs.el7
  • H
HTTP Request Smuggling

<0:7.64.1-36.jbcs.el7
  • H
Use After Free

<0:7.64.1-36.jbcs.el7
  • H
Resource Exhaustion

<0:7.64.1-14.jbcs.el7
  • H
Memory Leak

<0:7.64.1-36.jbcs.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:7.64.1-36.jbcs.el7
  • L
Use After Free

<0:7.64.1-21.jbcs.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:7.64.1-36.jbcs.el7
  • H
Resource Exhaustion

<0:7.78.0-3.jbcs.el7
  • H
NULL Pointer Dereference

<0:7.78.0-3.jbcs.el7
  • H
Out-of-bounds Write

<0:7.78.0-3.jbcs.el7
  • H
Use After Free

<0:7.78.0-3.jbcs.el7
  • H
Use After Free

<0:7.78.0-3.jbcs.el7
  • H
Missing Initialization of a Variable

<0:7.64.1-36.jbcs.el7
  • H
Uncontrolled Recursion

<0:7.77.0-2.jbcs.el7
  • H
Information Exposure

<0:7.77.0-2.jbcs.el7
  • L
Heap-based Buffer Overflow

<0:7.64.1-21.jbcs.el7
  • H
Missing Release of Resource after Effective Lifetime

<0:7.64.1-36.jbcs.el7
  • H
Improper Access Control

<0:7.64.1-14.jbcs.el7
  • L
Path Equivalence

<0:7.64.1-21.jbcs.el7
  • H
Resource Exhaustion

<0:7.64.1-36.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:7.64.1-44.jbcs.el7
  • H
Heap-based Buffer Overflow

<0:7.64.1-36.jbcs.el7
  • H
Resource Exhaustion

<0:7.64.1-14.jbcs.el7
  • H
Resource Exhaustion

<0:7.64.1-14.jbcs.el7
  • H
Resource Exhaustion

<0:7.64.1-14.jbcs.el7
  • H
Resource Exhaustion

<0:7.64.1-14.jbcs.el7
  • H
Covert Timing Channel

<0:7.64.1-14.jbcs.el7
  • H
Covert Timing Channel

<0:7.64.1-14.jbcs.el7
  • M
Improper Input Validation

<0:7.78.0-2.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:7.78.0-2.jbcs.el7
  • M
Out-of-Bounds

<0:7.78.0-2.jbcs.el7
  • M
NULL Pointer Dereference

<0:7.78.0-2.jbcs.el7
  • M
NULL Pointer Dereference

<0:7.78.0-2.jbcs.el7
  • H
Information Exposure

<0:7.77.0-2.jbcs.el7
  • M
Out-of-Bounds

<0:7.78.0-2.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:7.78.0-2.jbcs.el7
  • M
Out-of-bounds Read

<0:7.78.0-2.jbcs.el7
  • M
Improper Authentication

<0:7.78.0-2.jbcs.el7
  • H
Information Exposure

<0:7.64.1-14.jbcs.el7