nasm vulnerabilities

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the nasm package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Stack-based Buffer Overflow

    [0,)
    • M
    Heap-based Buffer Overflow

    [0,)
    • M
    Use After Free

    [0,)
    • M
    Stack-based Buffer Overflow

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Denial of Service (DoS)

    [,2.15.05)
    • H
    Denial of Service (DoS)

    [,2.16.01)
    • H
    Denial of Service (DoS)

    [,2.15.05)
    • H
    Stack-based Buffer Overflow

    [0,)
    • H
    NULL Pointer Dereference

    [0,)
    • H
    Stack-based Buffer Overflow

    [0,)
    • H
    Denial of Service (DoS)

    [,2.15.05)
    • M
    Stack-based Buffer Overflow

    [0,)
    • H
    Denial of Service (DoS)

    [,2.15.05)
    • H
    Use After Free

    [0,)
    • H
    Heap-based Buffer Overflow

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Buffer Overflow

    [0,)
    • M
    NULL Pointer Dereference

    [2.13.01,2.14)
    • H
    Out-of-bounds Read

    [0,)
    • H
    Out-of-bounds Read

    [0,)
    • M
    Out-of-Bounds

    [0,)
    • M
    Improper Input Validation

    [0,)
    • M
    Out-of-bounds Read

    [2.13.01,2.15.05)
    • H
    Out-of-bounds Read

    [2.13.01,2.14)
    • H
    Out-of-bounds Read

    [2.13.01,2.13.02)
    • M
    Buffer Overflow

    [0,)
    • M
    Out-of-bounds Read

    [0,)
    • H
    Out-of-bounds Read

    [0,)
    • M
    Divide By Zero

    [0,)
    • H
    Use After Free

    [,2.13.02)
    • H
    Out-of-bounds Read

    [0,)
    • M
    Use After Free

    [0,)
    • H
    Use After Free

    [0,)
    • H
    Use After Free

    [0,)
    • H
    Out-of-Bounds

    [0,)
    • M
    Use After Free

    [0,)
    • M
    Out-of-bounds Read

    [,2.15.05)
    • M
    Integer Overflow or Wraparound

    [0,)
    • M
    Out-of-bounds Read

    [,2.14)
    • C
    Double Free

    [,2.15.05)
    • H
    Out-of-bounds Read

    [,2.14)
    • M
    Improper Check for Unusual or Exceptional Conditions

    [,2.13.02)
    • L
    Buffer Overflow

    [,2.15.05)
    • M
    Buffer Overflow

    [0,)
    • M
    Buffer Overflow

    [0,)
    • M
    Improper Input Validation

    [,2.13.02)
    • M
    Out-of-bounds Write

    [0,)
    • M
    NULL Pointer Dereference

    [2.14,2.15.05)
    • M
    NULL Pointer Dereference

    [,2.14)
    • H
    Out-of-Bounds

    [0,)
    • M
    Out-of-Bounds

    [,2.15.05)
    • M
    Use After Free

    [2.13.01,2.13.02)
    • M
    Out-of-Bounds

    [2.13.01,2.13.02)
    • M
    Use After Free

    [2.13.01,2.15.05)
    • M
    Use After Free

    [2.13.01,2.13.02)
    • M
    NULL Pointer Dereference

    [0,)
    • M
    Use After Free

    [2.13.01,2.13.02)
    • C
    Arbitrary Code Execution

    [0,)
    • M
    Memory Leak

    [0,)