eap7-hibernate-envers vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the eap7-hibernate-envers package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Directory Traversal

<0:5.3.37-1.Final_redhat_00001.1.el9eap
  • H
Directory Traversal

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • H
Resource Exhaustion

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Resource Exhaustion

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • H
Truncation of Security-relevant Information

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • H
HTTP Request Smuggling

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • H
Improper Input Validation

<0:5.3.36-1.Final_redhat_00001.1.el9eap
  • M
Link Following

<0:5.3.33-2.Final_redhat_00001.1.el9eap
  • M
Information Exposure Through Log Files

<0:5.3.33-2.Final_redhat_00001.1.el9eap
  • H
Improper Initialization

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Resource Exhaustion

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Deserialization of Untrusted Data

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Directory Traversal

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Files or Directories Accessible to External Parties

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Improper Validation of Syntactic Correctness of Input

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Allocation of Resources Without Limits or Throttling

<0:5.3.32-1.Final_redhat_00001.1.el9eap
  • H
Information Exposure

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Uncontrolled Memory Allocation

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Allocation of Resources Without Limits or Throttling

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Inefficient Regular Expression Complexity

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Information Exposure

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • H
Resource Exhaustion

<0:5.3.31-1.Final_redhat_00001.1.el9eap
  • M
Deserialization of Untrusted Data

<0:5.3.27-1.Final_redhat_00001.1.el9eap
  • M
Creation of Temporary File With Insecure Permissions

<0:5.3.27-1.Final_redhat_00001.1.el9eap
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:5.3.27-1.Final_redhat_00001.1.el9eap