jbcs-httpd24-mod_jk-manual vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jbcs-httpd24-mod_jk-manual package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<0:1.2.48-16.redhat_1.jbcs.el7
  • H
Server-Side Request Forgery (SSRF)

<0:1.2.48-18.redhat_1.jbcs.el7
  • M
Out-of-Bounds

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
Out-of-bounds Read

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<0:1.2.48-10.redhat_1.jbcs.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:1.2.48-4.redhat_1.jbcs.el7
  • L
Use After Free

<0:1.2.46-26.redhat_1.jbcs.el7
  • H
Use After Free

<0:1.2.48-29.redhat_1.jbcs.el7
  • H
HTTP Request Smuggling

<0:1.2.48-29.redhat_1.jbcs.el7
  • H
Out-of-bounds Write

<0:1.2.48-29.redhat_1.jbcs.el7
  • M
Incorrect Default Permissions

*
  • H
Directory Traversal

<0:1.2.46-1.redhat_1.jbcs.el7
  • H
Out-of-Bounds

<0:1.2.41-14.redhat_1.jbcs.el7
  • H
Improper Input Validation

<0:1.2.41-14.redhat_1.jbcs.el7
  • H
Buffer Overflow

<0:1.2.41-14.redhat_1.jbcs.el7
  • M
Improper Certificate Validation

<0:1.2.48-10.redhat_1.jbcs.el7
  • H
HTTP Request Smuggling

<0:1.2.48-29.redhat_1.jbcs.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.2.48-29.redhat_1.jbcs.el7
  • H
Use After Free

<0:1.2.48-29.redhat_1.jbcs.el7
  • H
Authentication Bypass

<0:1.2.48-16.redhat_1.jbcs.el7
  • H
Use After Free

<0:1.2.48-16.redhat_1.jbcs.el7
  • H
Information Exposure

<0:1.2.48-16.redhat_1.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<0:1.2.48-10.redhat_1.jbcs.el7
  • M
Incorrect Calculation

<0:1.2.43-1.redhat_1.jbcs.el7
  • H
Resource Exhaustion

<0:1.2.46-1.redhat_1.jbcs.el7
  • H
Improper Input Validation

<0:1.2.46-1.redhat_1.jbcs.el7
  • H
NULL Pointer Dereference

<0:1.2.46-1.redhat_1.jbcs.el7
  • M
Information Exposure

<0:1.2.48-20.redhat_1.jbcs.el7
  • H
Server-Side Request Forgery (SSRF)

<0:1.2.48-18.redhat_1.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
Out-of-bounds Read

<0:1.2.48-20.redhat_1.jbcs.el7
  • H
Improper Input Validation

<0:1.2.46-1.redhat_1.jbcs.el7
  • M
Information Exposure

<0:1.2.43-1.redhat_1.jbcs.el7
  • M
Unchecked Error Condition

<0:1.2.43-1.redhat_1.jbcs.el7
  • M
Incorrect Calculation

<0:1.2.43-1.redhat_1.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.2.43-1.redhat_1.jbcs.el7
  • M
Resource Exhaustion

<0:1.2.48-10.redhat_1.jbcs.el7
  • M
Out-of-Bounds

<0:1.2.48-10.redhat_1.jbcs.el7
  • H
Insufficient Session Expiration

<0:1.2.46-22.redhat_1.jbcs.el7
  • H
Improper Certificate Validation

<0:1.2.48-16.redhat_1.jbcs.el7
  • H
Improper Certificate Validation

<0:1.2.48-13.redhat_1.jbcs.el7
  • H
NULL Pointer Dereference

<0:1.2.48-13.redhat_1.jbcs.el7
  • H
HTTP Request Smuggling

<0:1.2.48-4.redhat_1.jbcs.el7
  • H
Use After Free

<0:1.2.48-4.redhat_1.jbcs.el7
  • H
Resource Exhaustion

<0:1.2.46-22.redhat_1.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.2.43-1.redhat_1.jbcs.el7
  • H
Integer Overflow or Wraparound

<0:1.2.41-14.redhat_1.jbcs.el7
  • M
Out-of-bounds Read

<0:1.2.43-1.redhat_1.jbcs.el7
  • H
Memory Leak

<0:1.2.48-4.redhat_1.jbcs.el7
  • H
Covert Timing Channel

<0:1.2.41-14.redhat_1.jbcs.el7
  • M
Unchecked Error Condition

<0:1.2.43-1.redhat_1.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.2.43-1.redhat_1.jbcs.el7
  • H
Out-of-bounds Write

<0:1.2.41-14.redhat_1.jbcs.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:1.2.48-4.redhat_1.jbcs.el7
  • L
Use After Free

<0:1.2.46-26.redhat_1.jbcs.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.2.48-4.redhat_1.jbcs.el7
  • H
Resource Exhaustion

<0:1.2.48-29.redhat_1.jbcs.el7
  • L
NULL Pointer Dereference

<0:1.2.48-11.redhat_1.jbcs.el7
  • H
NULL Pointer Dereference

<0:1.2.48-29.redhat_1.jbcs.el7
  • H
Out-of-bounds Write

<0:1.2.48-29.redhat_1.jbcs.el7
  • H
Use After Free

<0:1.2.48-29.redhat_1.jbcs.el7
  • H
Use After Free

<0:1.2.48-29.redhat_1.jbcs.el7
  • H
Missing Initialization of a Variable

<0:1.2.48-4.redhat_1.jbcs.el7
  • H
Uncontrolled Recursion

<0:1.2.48-16.redhat_1.jbcs.el7
  • H
Information Exposure

<0:1.2.48-16.redhat_1.jbcs.el7
  • L
Heap-based Buffer Overflow

<0:1.2.46-26.redhat_1.jbcs.el7
  • H
Missing Release of Resource after Effective Lifetime

<0:1.2.48-4.redhat_1.jbcs.el7
  • H
Improper Access Control

<0:1.2.46-22.redhat_1.jbcs.el7
  • L
Path Equivalence

<0:1.2.46-26.redhat_1.jbcs.el7
  • H
Resource Exhaustion

<0:1.2.48-4.redhat_1.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.2.48-10.redhat_1.jbcs.el7
  • H
Heap-based Buffer Overflow

<0:1.2.48-4.redhat_1.jbcs.el7
  • H
Resource Exhaustion

<0:1.2.46-22.redhat_1.jbcs.el7
  • H
Out-of-bounds Read

<0:1.2.46-1.redhat_1.jbcs.el7
  • H
Resource Exhaustion

<0:1.2.46-22.redhat_1.jbcs.el7
  • H
Resource Exhaustion

<0:1.2.46-22.redhat_1.jbcs.el7
  • H
Resource Exhaustion

<0:1.2.46-22.redhat_1.jbcs.el7
  • H
Authentication Bypass by Primary Weakness

<0:1.2.46-1.redhat_1.jbcs.el7
  • H
Out-of-bounds Read

<0:1.2.46-1.redhat_1.jbcs.el7
  • H
Covert Timing Channel

<0:1.2.46-22.redhat_1.jbcs.el7
  • H
Uncontrolled Recursion

<0:1.2.46-1.redhat_1.jbcs.el7
  • H
Covert Timing Channel

<0:1.2.46-22.redhat_1.jbcs.el7
  • H
Out-of-bounds Write

<0:1.2.46-1.redhat_1.jbcs.el7
  • H
Out-of-bounds Write

<0:1.2.46-1.redhat_1.jbcs.el7
  • M
Improper Input Validation

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
Out-of-Bounds

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
NULL Pointer Dereference

<0:1.2.48-20.redhat_1.jbcs.el7
  • H
Information Exposure

<0:1.2.48-16.redhat_1.jbcs.el7
  • M
HTTP Response Splitting

<0:1.2.43-1.redhat_1.jbcs.el7
  • M
Out-of-Bounds

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
Integer Overflow or Wraparound

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
Out-of-bounds Read

<0:1.2.48-20.redhat_1.jbcs.el7
  • M
Improper Authentication

<0:1.2.48-20.redhat_1.jbcs.el7
  • H
Information Exposure

<0:1.2.46-22.redhat_1.jbcs.el7
  • H
Out-of-Bounds

<0:1.2.46-1.redhat_1.jbcs.el7