Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Report a new vulnerability
VULNERABILITYAFFECTSTYPEPUBLISHED
  • H
HTTP Response Splitting
eap7-slf4j<0:1.7.22-2.redhat_1.1.ep7.el7rhel:71 Nov 2021
  • H
Deserialization of Untrusted Data
eap7-slf4j<0:1.7.22-3.redhat_2.1.ep7.el7rhel:726 Jul 2021
  • H
HTTP Request Smuggling
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Incorrect Permission Assignment for Critical Resource
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
HTTP Request Smuggling
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Information Exposure
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Out-of-Bounds
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
HTTP Request Smuggling
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Access Restriction Bypass
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Resource Exhaustion
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:726 Mar 2023
  • H
Deserialization of Untrusted Data
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:726 Mar 2023
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:726 Mar 2023
  • H
Improper Input Validation
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:726 Mar 2023
  • H
Improper Access Control
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:726 Mar 2023
  • H
Resource Exhaustion
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:726 Mar 2023
  • H
Information Exposure
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:726 Mar 2023
  • H
Directory Traversal
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:726 Mar 2023
  • M
Information Exposure
eap7-slf4j-api<0:1.7.22-4.redhat_2.1.el7eaprhel:726 Mar 2023
  • M
Deserialization of Untrusted Data
eap7-slf4j-api<0:1.7.22-4.1.redhat_2.1.el9eaprhel:926 Mar 2023
  • M
Creation of Temporary File With Insecure Permissions
eap7-slf4j-api<0:1.7.22-4.1.redhat_2.1.el9eaprhel:926 Mar 2023
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
eap7-slf4j-api<0:1.7.22-4.1.redhat_2.1.el9eaprhel:920 Mar 2022
  • H
HTTP Response Splitting
eap7-slf4j-api<0:1.7.22-2.redhat_1.1.ep7.el7rhel:71 Nov 2021
  • H
Deserialization of Untrusted Data
eap7-slf4j-api<0:1.7.22-3.redhat_2.1.ep7.el7rhel:726 Jul 2021
  • H
HTTP Request Smuggling
eap7-slf4j-ext<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Incorrect Permission Assignment for Critical Resource
eap7-slf4j-ext<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
HTTP Request Smuggling
eap7-slf4j-ext<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Information Exposure
eap7-slf4j-ext<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Out-of-Bounds
eap7-slf4j-ext<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')
eap7-slf4j-ext<0:1.7.22-2.redhat_1.1.ep7.el7rhel:730 Mar 2023