nss vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nss package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Use of a Broken or Risky Cryptographic Algorithm

<2:3.26-1+debu8u11
  • M
Information Exposure

<2:3.26-1+debu8u11
  • C
Insufficient Verification of Data Authenticity

<2:3.26-1+debu8u10
  • H
Improper Certificate Validation

<2:3.26-1+debu8u8
  • H
Out-of-bounds Write

<2:3.26-1+debu8u7
  • H
Out-of-Bounds

<2:3.26-1+debu8u5
  • M
Improper Certificate Validation

*
  • H
Out-of-bounds Read

<2:3.26-1+debu8u5
  • M
NULL Pointer Dereference

<2:3.26-1+debu8u4
  • M
CVE-2018-12404

<2:3.26-1+debu8u4
  • M
PRNG Seed Error

*
  • M
Session Fixation

<2:3.25-1
  • H
NULL Pointer Dereference

<2:3.25-1
  • M
Key Management Errors

<2:3.25-1
  • M
Information Exposure

<2:3.26-1+debu8u5
  • H
Use After Free

<2:3.26-1+debu8u3
  • M
Incorrect Calculation

<2:3.26-1+debu8u2
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
NULL Pointer Dereference

<2:3.26-1+debu8u2
  • C
Out-of-bounds Write

<2:3.26-1+debu8u2
  • H
CVE-2016-2834

<2:3.26-1+debu8u1
  • H
CVE-2016-1978

<2:3.26-1+debu8u1
  • H
CVE-2016-1979

<2:3.26-1+debu8u1
  • H
Out-of-Bounds

<2:3.26-1+debu8u1
  • M
Cryptographic Issues

<3.13
  • M
Cryptographic Issues

<2:3.26-1+debu8u1
  • M
Improper Data Handling

<2:3.26-1+debu8u1
  • C
Out-of-Bounds

<2:3.26-1+debu8u1
  • H
Out-of-Bounds

<2:3.26-1+debu8u1
  • M
Cryptographic Issues

<2:3.17.2-1.1+deb8u1
  • M
Cryptographic Issues

<2:3.17.2-1.1+deb8u1
  • L
Cryptographic Issues

<2:3.26-1+debu8u1
  • H
CVE-2014-1569

<2:3.17.2-1.1
  • L
Cryptographic Issues

<2:3.17.1-1
  • H
Cryptographic Issues

<2:3.17.1-1
  • C
CVE-2014-1544

<2:3.16.3-1
  • M
Improper Input Validation

<2:3.16-1
  • M
Inadequate Encryption Strength

<2:3.15.4-1
  • H
Race Condition

<2:3.15.4-1
  • M
Cryptographic Issues

<2:3.15.4-1
  • H
Improper Input Validation

<2:3.15.3-1
  • H
Numeric Errors

<2:3.15.3-1
  • M
Access Restriction Bypass

<2:3.15.3-1
  • M
CVE-2013-1739

<2:3.15.2-1
  • M
Out-of-Bounds

<2:3.14.3-1
  • M
Cryptographic Issues

<2:3.14.3-1
  • L
Cryptographic Issues

<2:3.14.3-1
  • M
Out-of-Bounds

<3.13.4-1
  • H
Untrusted Search Path

<3.13.1.with.ckbi.1.88-1
  • M
Improper Input Validation

<3.13.1.with.ckbi.1.88-1
  • H
Cryptographic Issues

<3.12.8-1
  • M
Cryptographic Issues

<3.12.8-1
  • M
Cryptographic Issues

<3.12.6-1
  • H
Out-of-Bounds

<3.12.3-1
  • M
Improper Input Validation

<3.12.3-1
  • M
Cryptographic Issues

<3.12.3-1