jbcs-httpd24-mod_md

Direct Vulnerabilities

Known vulnerabilities in the jbcs-httpd24-mod_md package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

<1:2.4.28-13.el7jbcs
  • H
Incorrect Calculation of Buffer Size

<1:2.4.28-13.el7jbcs
  • H
Information Exposure

<1:2.4.28-13.el7jbcs
  • H
Integer Overflow or Wraparound

<1:2.4.28-13.el7jbcs
  • H
Improper Neutralization

<1:2.4.28-13.el7jbcs
  • H
Authentication Bypass by Primary Weakness

<1:2.4.28-13.el7jbcs
  • H
Excessive Platform Resource Consumption within a Loop

<1:2.4.28-10.el7jbcs
  • H
Improper Access Control

<1:2.4.28-10.el7jbcs
  • M
Server-Side Request Forgery (SSRF)

*
  • H
Improper Output Neutralization for Logs

<1:2.4.28-10.el7jbcs
  • H
Improper Authentication

<1:2.4.28-10.el7jbcs
  • M
Improper Input Validation

*
  • H
Reachable Assertion

<1:2.4.28-10.el7jbcs
  • M
Memory Leak

*
  • H
Inclusion of Functionality from Untrusted Control Sphere

<1:2.4.24-11.el7jbcs
  • H
NULL Pointer Dereference

<1:2.4.24-11.el7jbcs
  • H
Improper Encoding or Escaping of Output

<1:2.4.24-11.el7jbcs
  • H
Improper Encoding or Escaping of Output

<1:2.4.24-11.el7jbcs
  • H
Improper Input Validation

<1:2.4.24-11.el7jbcs
  • H
Improper Encoding or Escaping of Output

<1:2.4.24-11.el7jbcs
  • M
Detection of Error Condition Without Action

<1:2.4.24-6.el7jbcs
  • M
Improper Validation of Certificate with Host Mismatch

<1:2.4.24-6.el7jbcs
  • M
Missing Release of Resource after Effective Lifetime

<1:2.4.24-6.el7jbcs
  • M
Improper Certificate Validation

<1:2.4.24-6.el7jbcs
  • M
Misinterpretation of Input

<1:2.4.24-6.el7jbcs
  • M
Resource Exhaustion

<1:2.4.24-6.el7jbcs
  • M
Improper Certificate Validation

<1:2.0.8-30.jbcs.el7
  • H
HTTP Request Smuggling

<1:2.0.8-41.jbcs.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.0.8-41.jbcs.el7
  • H
Use After Free

<1:2.0.8-41.jbcs.el7
  • H
Authentication Bypass

<1:2.0.8-36.jbcs.el7
  • H
Use After Free

<1:2.0.8-36.jbcs.el7
  • H
Information Exposure

<1:2.0.8-36.jbcs.el7
  • M
NULL Pointer Dereference

<1:2.0.8-40.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<1:2.0.8-30.jbcs.el7
  • M
Information Exposure

<1:2.0.8-40.jbcs.el7
  • H
Server-Side Request Forgery (SSRF)

<1:2.0.8-38.jbcs.el7
  • M
NULL Pointer Dereference

<1:2.0.8-40.jbcs.el7
  • M
Out-of-bounds Read

<1:2.0.8-40.jbcs.el7
  • M
Resource Exhaustion

<1:2.0.8-30.jbcs.el7
  • M
Allocation of Resources Without Limits or Throttling

<1:2.0.8-30.jbcs.el7
  • H
Insufficient Session Expiration

<0:2.4.37-33.jbcs.el7
  • H
Improper Certificate Validation

<1:2.0.8-36.jbcs.el7
  • H
Improper Certificate Validation

<1:2.0.8-33.jbcs.el7
  • H
NULL Pointer Dereference

<1:2.0.8-33.jbcs.el7
  • H
HTTP Request Smuggling

<1:2.0.8-24.jbcs.el7
  • H
Use After Free

<1:2.0.8-24.jbcs.el7
  • H
Resource Exhaustion

<0:2.4.37-33.jbcs.el7
  • H
Memory Leak

<1:2.0.8-24.jbcs.el7
  • H
Allocation of Resources Without Limits or Throttling

<1:2.0.8-24.jbcs.el7
  • L
Use After Free

<1:2.0.8-10.jbcs.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.0.8-24.jbcs.el7
  • H
Resource Exhaustion

<1:2.0.8-41.jbcs.el7
  • L
NULL Pointer Dereference

<1:2.0.8-31.jbcs.el7
  • H
NULL Pointer Dereference

<1:2.0.8-41.jbcs.el7
  • H
Out-of-bounds Write

<1:2.0.8-41.jbcs.el7
  • H
Use After Free

<1:2.0.8-41.jbcs.el7
  • H
Use After Free

<1:2.0.8-41.jbcs.el7
  • H
Missing Initialization of a Variable

<1:2.0.8-24.jbcs.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:2.0.8-36.jbcs.el7
  • H
Information Exposure

<1:2.0.8-36.jbcs.el7
  • L
Heap-based Buffer Overflow

<1:2.0.8-10.jbcs.el7
  • H
Missing Release of Resource after Effective Lifetime

<1:2.0.8-24.jbcs.el7
  • H
Improper Access Control

<0:2.4.37-33.jbcs.el7
  • L
Path Equivalence

<1:2.0.8-10.jbcs.el7
  • H
Resource Exhaustion

<1:2.0.8-24.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:2.0.8-30.jbcs.el7
  • H
Out-of-bounds Read

<1:2.0.8-24.jbcs.el7
  • H
Resource Exhaustion

<0:2.4.37-33.jbcs.el7
  • H
Resource Exhaustion

<0:2.4.37-33.jbcs.el7
  • H
Resource Exhaustion

<0:2.4.37-33.jbcs.el7
  • H
Resource Exhaustion

<0:2.4.37-33.jbcs.el7
  • H
Covert Timing Channel

<0:2.4.37-33.jbcs.el7
  • H
Covert Timing Channel

<0:2.4.37-33.jbcs.el7
  • M
Improper Input Validation

<1:2.0.8-40.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:2.0.8-40.jbcs.el7
  • M
Out-of-Bounds

<1:2.0.8-40.jbcs.el7
  • M
NULL Pointer Dereference

<1:2.0.8-40.jbcs.el7
  • M
NULL Pointer Dereference

<1:2.0.8-40.jbcs.el7
  • H
Information Exposure

<1:2.0.8-36.jbcs.el7
  • M
Out-of-Bounds

<1:2.0.8-40.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:2.0.8-40.jbcs.el7
  • M
Out-of-bounds Read

<1:2.0.8-40.jbcs.el7
  • M
Improper Authentication

<1:2.0.8-40.jbcs.el7
  • H
Information Exposure

<0:2.4.37-33.jbcs.el7