jws5-ecj vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jws5-ecj package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
SQL Injection

<0:4.12.0-3.redhat_2.2.el7jws
  • M
Race Condition

<0:4.20.0-1.redhat_00002.1.el7jws
  • M
Time-of-check Time-of-use (TOCTOU)

<0:4.20.0-1.redhat_00002.1.el7jws
  • H
Improper Input Validation

<0:4.12.0-1.redhat_1.1.el7jws
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.1-5.redhat_1.1.el7jws
  • M
Improper Input Validation

<0:4.6.1-6.redhat_1.1.el7jws
  • M
Improper Access Control

<0:4.6.1-6.redhat_1.1.el7jws
  • M
Deserialization of Untrusted Data

<0:4.12.0-3.redhat_2.2.el7jws
  • M
Information Exposure

<0:4.12.0-3.redhat_2.2.el7jws
  • H
Missing Required Cryptographic Step

<0:4.12.0-1.redhat_1.1.el7jws
  • H
Resource Exhaustion

<0:4.12.0-1.redhat_1.1.el7jws
  • H
Cross-site Scripting (XSS)

<0:4.12.0-1.redhat_1.1.el7jws
  • H
Resource Exhaustion

<0:4.12.0-1.redhat_1.1.el7jws
  • H
Information Exposure

<0:4.12.0-1.redhat_1.1.el7jws