jbcs-httpd24-openssl-static vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jbcs-httpd24-openssl-static package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-Bounds

<1:1.1.1g-8.jbcs.el7
  • M
Out-of-bounds Read

<1:1.1.1g-8.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<1:1.1.1c-32.jbcs.el7
  • L
Use After Free

<1:1.1.1c-4.jbcs.el7
  • H
Use After Free

<1:1.1.1g-11.jbcs.el7
  • H
HTTP Request Smuggling

<1:1.1.1g-11.jbcs.el7
  • H
Out-of-bounds Write

<1:1.1.1g-11.jbcs.el7
  • M
Cross-site Scripting (XSS)

<1:1.1.1k-17.el7jbcs
  • M
Missing Encryption of Sensitive Data

<1:1.1.1k-17.el7jbcs
  • M
Information Exposure

<1:1.1.1k-17.el7jbcs
  • M
Out-of-bounds Read

<1:1.1.1k-17.el7jbcs
  • H
Resource Exhaustion

<1:1.1.1k-16.el7jbcs
  • H
Information Exposure

<1:1.1.1k-16.el7jbcs
  • H
External Control of File Name or Path

<1:1.1.1k-16.el7jbcs
  • H
Out-of-Bounds

<1:1.1.1k-16.el7jbcs
  • H
Allocation of Resources Without Limits or Throttling

<1:1.1.1k-16.el7jbcs
  • H
Resource Exhaustion

<1:1.1.1k-16.el7jbcs
  • H
Resource Exhaustion

<1:1.1.1k-16.el7jbcs
  • H
Improper Certificate Validation

<1:1.1.1k-16.el7jbcs
  • H
Improper Certificate Validation

<1:1.1.1k-16.el7jbcs
  • H
Resource Exhaustion

<1:1.1.1k-16.el7jbcs
  • M
Missing Required Cryptographic Step

<1:1.1.1k-17.el7jbcs
  • H
Excessive Iteration

<1:1.1.1k-16.el7jbcs
  • H
Directory Traversal

<1:1.0.2n-14.jbcs.el7
  • H
Out-of-Bounds

<1:1.0.2h-12.jbcs.el7
  • M
Out-of-Bounds

<1:1.0.2h-4.jbcs.el7
  • M
Improper Input Validation

<1:1.0.2h-4.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2h-12.jbcs.el7
  • H
Buffer Overflow

<1:1.0.2h-12.jbcs.el7
  • M
Improper Certificate Validation

<1:1.1.1c-32.jbcs.el7
  • H
Special Element Injection

<1:1.1.1k-14.el7jbcs
  • H
Directory Traversal

<1:1.1.1k-14.el7jbcs
  • H
HTTP Response Splitting

<1:1.1.1k-14.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<1:1.1.1k-14.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<1:1.1.1k-14.el7jbcs
  • H
Allocation of Resources Without Limits or Throttling

<1:1.1.1k-14.el7jbcs
  • H
Integer Overflow or Wraparound

<1:1.1.1k-14.el7jbcs
  • H
Incorrect Type Conversion or Cast

<1:1.1.1k-14.el7jbcs
  • H
Use After Free

<1:1.1.1k-14.el7jbcs
  • H
Double Free

<1:1.1.1k-14.el7jbcs
  • H
Information Exposure

<1:1.1.1k-14.el7jbcs
  • H
Out-of-bounds Read

<1:1.1.1k-14.el7jbcs
  • H
Cleartext Transmission of Sensitive Information

<1:1.1.1k-14.el7jbcs
  • H
Use After Free

<1:1.1.1k-14.el7jbcs
  • M
Cleartext Transmission of Sensitive Information

<1:1.1.1k-13.el7jbcs
  • M
Double Free

<1:1.1.1k-13.el7jbcs
  • M
Expected Behavior Violation

<1:1.1.1k-13.el7jbcs
  • M
Improper Validation of Syntactic Correctness of Input

<1:1.1.1k-13.el7jbcs
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<1:1.1.1k-13.el7jbcs
  • M
Allocation of Resources Without Limits or Throttling

<1:1.1.1k-13.el7jbcs
  • M
Improper Preservation of Permissions

<1:1.1.1k-13.el7jbcs
  • M
Arbitrary Command Injection

<1:1.1.1k-13.el7jbcs
  • M
Insufficient Verification of Data Authenticity

<1:1.1.1k-13.el7jbcs
  • M
Allocation of Resources Without Limits or Throttling

<1:1.1.1k-13.el7jbcs
  • M
Integer Overflow or Wraparound

<1:1.1.1k-13.el7jbcs
  • M
Integer Overflow or Wraparound

<1:1.1.1k-13.el7jbcs
  • M
HTTP Request Smuggling

<1:1.1.1k-13.el7jbcs
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:1.1.1k-13.el7jbcs
  • M
Arbitrary Command Injection

<1:1.1.1k-13.el7jbcs
  • M
Integer Overflow or Wraparound

<1:1.1.1k-13.el7jbcs
  • H
HTTP Request Smuggling

<1:1.1.1g-11.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.1.1k-13.el7jbcs
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:1.1.1g-11.jbcs.el7
  • H
Use After Free

<1:1.1.1g-11.jbcs.el7
  • M
NULL Pointer Dereference

<1:1.1.1g-8.jbcs.el7
  • M
Incorrect Calculation of Buffer Size

<1:1.1.1c-32.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2h-13.jbcs.el7
  • M
Incorrect Calculation

<1:1.0.2n-11.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2n-14.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2n-14.jbcs.el7
  • H
NULL Pointer Dereference

<1:1.0.2n-14.jbcs.el7
  • M
Information Exposure

<1:1.1.1g-8.jbcs.el7
  • M
NULL Pointer Dereference

<1:1.1.1g-8.jbcs.el7
  • M
Out-of-bounds Read

<1:1.1.1g-8.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2n-14.jbcs.el7
  • M
Information Exposure

<1:1.0.2n-11.jbcs.el7
  • M
Unchecked Error Condition

<1:1.0.2n-11.jbcs.el7
  • M
Incorrect Calculation

<1:1.0.2n-11.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.0.2n-11.jbcs.el7
  • M
Resource Exhaustion

<1:1.1.1c-32.jbcs.el7
  • M
Out-of-Bounds

<1:1.1.1c-32.jbcs.el7
  • H
Insufficient Session Expiration

<1:1.1.1-25.jbcs.el7
  • H
Use After Free

<1:1.0.2h-14.jbcs.el7
  • H
Missing Initialization of a Variable

<1:1.0.2h-14.jbcs.el7
  • H
Missing Initialization of a Variable

<1:1.0.2h-14.jbcs.el7
  • H
Improper Certificate Validation

<1:1.1.1g-6.jbcs.el7
  • H
NULL Pointer Dereference

<1:1.1.1g-6.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2h-13.jbcs.el7
  • H
Improper Input Validation

<1:1.0.2h-13.jbcs.el7
  • H
Improper Authentication

<1:1.0.2h-13.jbcs.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:1.0.2h-14.jbcs.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:1.0.2h-14.jbcs.el7
  • M
Open Redirect

<1:1.1.1c-16.jbcs.el7
  • M
Resource Exhaustion

<1:1.1.1c-16.jbcs.el7
  • H
HTTP Request Smuggling

<1:1.1.1-25.jbcs.el7
  • M
Use After Free

<1:1.1.1c-16.jbcs.el7
  • H
Use After Free

<1:1.1.1-25.jbcs.el7
  • M
Buffer Overflow

<1:1.1.1c-16.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.0.2n-11.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2h-13.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2h-13.jbcs.el7
  • H
Integer Overflow or Wraparound

<1:1.0.2h-13.jbcs.el7
  • H
Integer Overflow or Wraparound

<1:1.0.2h-12.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2h-13.jbcs.el7
  • H
Resource Exhaustion

<1:1.0.2h-13.jbcs.el7
  • M
Out-of-bounds Read

<1:1.0.2n-11.jbcs.el7
  • H
Covert Timing Channel

<1:1.0.2h-12.jbcs.el7
  • H
Covert Timing Channel

<1:1.0.2h-13.jbcs.el7
  • M
Unchecked Error Condition

<1:1.0.2n-11.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.0.2n-11.jbcs.el7
  • H
Out-of-bounds Write

<1:1.0.2h-12.jbcs.el7
  • H
Improper Authentication

<1:1.0.2h-14.jbcs.el7
  • M
Encoding Error

<1:1.0.2h-4.jbcs.el7
  • L
Use After Free

<1:1.1.1c-4.jbcs.el7
  • M
Information Exposure

<1:1.1.1c-16.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1g-11.jbcs.el7
  • L
NULL Pointer Dereference

<1:1.1.1g-3.jbcs.el7
  • H
NULL Pointer Dereference

<1:1.1.1g-11.jbcs.el7
  • H
Out-of-bounds Write

<1:1.1.1g-11.jbcs.el7
  • H
Use After Free

<1:1.1.1g-11.jbcs.el7
  • H
Use After Free

<1:1.1.1g-11.jbcs.el7
  • L
Heap-based Buffer Overflow

<1:1.1.1c-4.jbcs.el7
  • M
Open Redirect

<1:1.1.1c-16.jbcs.el7
  • H
Improper Access Control

<1:1.1.1-25.jbcs.el7
  • L
Path Equivalence

<1:1.1.1c-4.jbcs.el7
  • M
Information Exposure

<1:1.1.1c-16.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.1.1c-32.jbcs.el7
  • M
Client-Side Enforcement of Server-Side Security

<1:1.1.1c-16.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • H
Out-of-bounds Read

<1:1.0.2n-14.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • H
Resource Exhaustion

<1:1.1.1-25.jbcs.el7
  • H
Authentication Bypass by Primary Weakness

<1:1.0.2n-14.jbcs.el7
  • H
Out-of-bounds Read

<1:1.0.2n-14.jbcs.el7
  • M
Cross-site Scripting (XSS)

<1:1.1.1c-16.jbcs.el7
  • H
Covert Timing Channel

<1:1.1.1-25.jbcs.el7
  • H
Uncontrolled Recursion

<1:1.0.2n-14.jbcs.el7
  • H
Information Exposure

<1:1.0.2n-15.jbcs.el7
  • H
Covert Timing Channel

<1:1.1.1-25.jbcs.el7
  • H
Missing Required Cryptographic Step

<1:1.0.2n-15.jbcs.el7
  • H
Out-of-bounds Write

<1:1.0.2n-14.jbcs.el7
  • H
Out-of-bounds Write

<1:1.0.2n-14.jbcs.el7
  • H
Execution with Unnecessary Privileges

<1:1.0.2n-15.jbcs.el7
  • M
Improper Input Validation

<1:1.1.1g-8.jbcs.el7
  • H
Covert Timing Channel

<1:1.0.2h-13.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.1.1g-8.jbcs.el7
  • M
Out-of-Bounds

<1:1.1.1g-8.jbcs.el7
  • M
NULL Pointer Dereference

<1:1.1.1g-8.jbcs.el7
  • M
NULL Pointer Dereference

<1:1.1.1g-8.jbcs.el7
  • M
HTTP Response Splitting

<1:1.0.2n-11.jbcs.el7
  • M
Out-of-Bounds

<1:1.1.1g-8.jbcs.el7
  • M
Integer Overflow or Wraparound

<1:1.1.1g-8.jbcs.el7
  • M
Out-of-bounds Read

<1:1.1.1g-8.jbcs.el7
  • M
Improper Authentication

<1:1.1.1g-8.jbcs.el7
  • H
Information Exposure

<1:1.1.1-25.jbcs.el7
  • H
Out-of-Bounds

<1:1.0.2n-14.jbcs.el7