Direct Vulnerabilities

Known vulnerabilities in the nss package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2026-6766

<2:3.123-1
  • L
CVE-2026-6772

<2:3.123-1
  • L
CVE-2026-6767

<2:3.123-1
  • C
Integer Overflow or Wraparound

<2:3.121-1
  • L
CVE-2024-6602

<2:3.101-1
  • M
Information Exposure

<2:3.95-1
  • L
Information Exposure

<2:3.98-1
  • M
Information Exposure

<2:3.61-1
  • M
Information Exposure

<2:3.55-1
  • M
Information Exposure

<2:3.17-1
  • M
NULL Pointer Dereference

<2:3.42.1-1
  • M
Improper Authentication

<2:3.49-1
  • M
Use of a Broken or Risky Cryptographic Algorithm

<2:3.53.1-1
  • M
CVE-2020-6829

<2:3.55-1
  • C
Insufficient Verification of Data Authenticity

<2:3.47-1
  • H
Out-of-bounds Read

<2:3.45-1
  • H
CVE-2022-3479

<2:3.87-1
  • L
Out-of-Bounds

*
  • H
NULL Pointer Dereference

<2:3.26.2-1.1
  • C
Out-of-Bounds

<2:3.20.1-1
  • M
Improper Input Validation

<2:3.16-1
  • M
Cryptographic Issues

<2:3.21-1
  • H
Race Condition

<2:3.15.4-1
  • C
CVE-2014-1544

<2:3.16.3-1
  • M
Access Restriction Bypass

<2:3.15.3-1
  • L
Out-of-Bounds

*
  • L
Untrusted Search Path

<3.13.1.with.ckbi.1.88-1
  • M
Key Management Errors

<2:3.25-1
  • H
Cryptographic Issues

<2:3.17.1-1
  • L
Out-of-Bounds

<2:3.14.3-1
  • M
Improper Input Validation

<3.13.1.with.ckbi.1.88-1
  • H
Allocation of Resources Without Limits or Throttling

<2:3.58-1
  • L
Cryptographic Issues

<3.12.3-1
  • H
Out-of-Bounds

<2:3.45-1
  • H
CVE-2024-6609

<2:3.101-1
  • M
Session Fixation

<2:3.25-1
  • H
NULL Pointer Dereference

<2:3.25-1
  • M
Cryptographic Issues

<2:3.19.1-1
  • H
CVE-2014-1569

<2:3.17.2-1.1
  • M
Inadequate Encryption Strength

<2:3.15.4-1
  • H
CVE-2016-1978

<2:3.21-1
  • H
Numeric Errors

<2:3.15.3-1
  • H
Out-of-Bounds

<2:3.20.1-1
  • M
Improper Input Validation

<3.12.3-1
  • M
CVE-2024-7531

<2:3.103-1
  • M
Improper Certificate Validation

<2:3.73-1
  • H
CVE-2023-0767

<2:3.87.1-1
  • L
Out-of-Bounds

<3.12.3-1
  • M
Cryptographic Issues

<3.12.8-1
  • M
Information Exposure

<2:3.53-1
  • L
PRNG Seed Error

<2:3.39-1
  • M
Cryptographic Issues

<3.13
  • H
Out-of-Bounds

<2:3.23-1
  • M
CVE-2013-1739

<2:3.15.2-1
  • L
Cryptographic Issues

<2:3.14.3-1
  • M
Cryptographic Issues

<3.12.6-1
  • H
Cryptographic Issues

<3.12.8-1
  • H
Unchecked Return Value

<2:3.96.1-1
  • M
Improper Certificate Validation

<2:3.45-1
  • H
Out-of-bounds Write

<2:3.47.1-1
  • H
CVE-2016-2834

<2:3.23-1
  • M
Use of a Broken or Risky Cryptographic Algorithm

<2:3.55-1
  • L
Out-of-Bounds

*
  • C
Out-of-bounds Read

<2:3.55-1
  • C
Out-of-bounds Write

<2:3.73-1
  • H
Improper Input Validation

<2:3.15.3-1
  • L
Cryptographic Issues

<2:3.17.1-1
  • M
Out-of-Bounds

<3.13.4-1
  • M
Improper Data Handling

<2:3.21-1
  • C
Out-of-bounds Write

<2:3.26.2-1.1
  • M
Cryptographic Issues

<2:3.19.1-1
  • L
Out-of-Bounds

*
  • M
Incorrect Calculation

<2:3.26.2-1.1
  • H
Use After Free

<2:3.33-1
  • M
Information Exposure

<2:3.26.2-1
  • H
CVE-2016-1979

<2:3.21-1
  • M
CVE-2018-12404

<2:3.41-1
  • L
Cryptographic Issues

<2:3.19.1-1
  • H
Improper Certificate Validation

<2:3.45-1
  • L
Cryptographic Issues

<2:3.14.3-1
  • M
Cryptographic Issues

<2:3.15.4-1