eap7-netty-all vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the eap7-netty-all package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

<0:4.1.119-1.Final_redhat_00004.1.el8eap
  • H
Improper Input Validation

<0:4.1.119-1.Final_redhat_00004.1.el8eap
  • H
Improper Access Control

<0:4.1.119-1.Final_redhat_00004.1.el8eap
  • H
Resource Exhaustion

<0:4.1.119-1.Final_redhat_00004.1.el8eap
  • H
Uncontrolled Recursion

<0:4.1.108-1.Final_redhat_00001.1.el8eap
  • H
Memory Leak

<0:4.1.108-1.Final_redhat_00001.1.el8eap
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.108-1.Final_redhat_00001.1.el8eap
  • H
Information Exposure

<0:4.1.108-1.Final_redhat_00001.1.el8eap
  • H
Improper Input Validation

<0:4.1.108-1.Final_redhat_00001.1.el8eap
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.108-1.Final_redhat_00001.1.el8eap
  • H
Resource Exhaustion

<0:4.1.108-1.Final_redhat_00001.1.el8eap
  • H
Resource Exhaustion

<0:4.1.94-2.Final_redhat_00003.1.el8eap
  • H
Information Exposure

<0:4.1.94-1.Final_redhat_00001.1.el8eap
  • H
Uncontrolled Memory Allocation

<0:4.1.94-1.Final_redhat_00001.1.el8eap
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.94-1.Final_redhat_00001.1.el8eap
  • H
Inefficient Regular Expression Complexity

<0:4.1.94-1.Final_redhat_00001.1.el8eap
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:4.1.94-1.Final_redhat_00001.1.el8eap
  • H
Information Exposure

<0:4.1.94-1.Final_redhat_00001.1.el8eap
  • H
Resource Exhaustion

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Information Exposure Through Log Files

<0:4.1.34-2.Final_redhat_00002.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el8eap
  • H
Information Exposure Through Server Error Message

<0:4.1.86-1.Final_redhat_00001.1.el8eap
  • M
Deserialization of Untrusted Data

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • H
Information Exposure

<0:4.1.63-1.Final_redhat_00001.1.el8eap
  • H
Information Exposure

<0:4.1.63-1.Final_redhat_00001.1.el8eap
  • H
Improper Input Validation

<0:4.1.63-1.Final_redhat_00001.1.el8eap
  • H
Cross-site Scripting (XSS)

<0:4.1.63-1.Final_redhat_00001.1.el8eap
  • H
Improper Authorization

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Exposed Dangerous Method or Function

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Session Fixation

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
HTTP Request Smuggling

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Resource Exhaustion

<0:4.1.94-1.Final_redhat_00001.1.el8eap
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.86-1.Final_redhat_00001.1.el8eap
  • H
Race Condition

<0:4.1.63-1.Final_redhat_00001.1.el8eap
  • H
Memory Leak

<0:4.1.63-1.Final_redhat_00001.1.el8eap
  • H
Improper Input Validation

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Cross-site Scripting (XSS)

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
SQL Injection

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Information Exposure Through Log Files

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Missing Authorization

<0:4.1.34-2.Final_redhat_00002.1.el8eap
  • H
Arbitrary Code Injection

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Unchecked Return Value

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Incorrect Authorization

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Memory Leak

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Allocation of Resources Without Limits or Throttling

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Deserialization of Untrusted Data

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • H
Information Exposure

<0:4.1.86-1.Final_redhat_00001.1.el8eap
  • M
Deserialization of Untrusted Data

<0:4.1.77-1.Final_redhat_00001.1.el8eap
  • H
HTTP Request Smuggling

<0:4.1.45-1.Final_redhat_00001.1.el8eap
  • H
HTTP Request Smuggling

<0:4.1.45-1.Final_redhat_00001.1.el8eap
  • H
HTTP Request Smuggling

<0:4.1.45-1.Final_redhat_00001.1.el8eap
  • H
HTTP Request Smuggling

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Improper Resource Shutdown or Release

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Resource Exhaustion

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
HTTP Request Smuggling

<0:4.1.63-1.Final_redhat_00001.1.el8eap
  • M
HTTP Request Smuggling

<0:4.1.60-1.Final_redhat_00001.1.el8eap
  • M
Information Exposure

<0:4.1.60-1.Final_redhat_00001.1.el8eap
  • H
Uncontrolled Recursion

<0:4.1.86-1.Final_redhat_00001.1.el8eap
  • H
Out-of-Bounds

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • M
Creation of Temporary File With Insecure Permissions

<0:4.1.77-1.Final_redhat_00001.1.el8eap
  • M
HTTP Request Smuggling

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • H
Creation of Temporary File With Insecure Permissions

<0:4.1.86-1.Final_redhat_00001.1.el8eap
  • H
Out-of-bounds Write

<0:4.1.86-1.Final_redhat_00001.1.el8eap
  • H
Improper Input Validation

<0:4.1.86-1.Final_redhat_00001.1.el8eap
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:4.1.86-1.Final_redhat_00001.1.el8eap
  • H
Out-of-bounds Write

<0:4.1.86-1.Final_redhat_00001.1.el8eap
  • M
Directory Traversal

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:4.1.77-1.Final_redhat_00001.1.el8eap
  • M
Resource Exhaustion

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Improper Handling of Insufficient Permissions or Privileges

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.72-4.Final_redhat_00001.1.el8eap
  • H
Improper Input Validation

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Static Code Injection

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Static Code Injection

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
XML External Entity (XXE) Injection

<0:4.1.48-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el8eap
  • H
Directory Traversal

<0:4.1.63-1.Final_redhat_00001.1.el8eap
  • M
Arbitrary Command Injection

<0:4.1.60-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.42-1.Final_redhat_00001.1.el8eap
  • H
Deserialization of Untrusted Data

<0:4.1.34-2.Final_redhat_00002.1.el8eap