kernel-uek-debug-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-uek-debug-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Divide By Zero

<0:4.1.12-124.92.3.el6uek
  • H
Use After Free

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-26894

<0:4.1.12-124.92.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-45008

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-39499

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-38599

<0:4.1.12-124.92.3.el6uek
  • H
Improper Locking

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-26973

<0:4.1.12-124.92.3.el6uek
  • H
Improper Validation of Array Index

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-40904

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-40943

<0:4.1.12-124.92.3.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-27059

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-27436

<0:4.1.12-124.92.3.el6uek
  • H
CVE-2024-38560

<0:4.1.12-124.92.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.92.3.el6uek
  • H
Integer Underflow

<0:4.1.12-124.91.3.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.91.3.el6uek
  • H
CVE-2022-48760

<0:4.1.12-124.91.3.el6uek
  • H
CVE-2024-35877

<0:4.1.12-124.90.3.el6uek
  • H
CVE-2024-35935

<0:4.1.12-124.90.3.el6uek
  • H
CVE-2024-35930

<0:4.1.12-124.90.3.el6uek
  • H
CVE-2024-26931

<0:4.1.12-124.90.3.el6uek
  • H
CVE-2024-36004

<0:4.1.12-124.90.3.el6uek
  • H
CVE-2024-35886

<0:4.1.12-124.90.3.el6uek
  • H
CVE-2024-35947

<0:4.1.12-124.90.3.el6uek
  • H
CVE-2021-47356

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2023-52620

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2021-47153

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26778

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26880

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-36883

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2021-47310

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-35944

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26859

<0:4.1.12-124.89.4.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2022-48627

<0:4.1.12-124.89.4.el6uek
  • H
Improper Validation of Array Index

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26805

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2021-47284

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26651

<0:4.1.12-124.89.4.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26635

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2021-47353

<0:4.1.12-124.89.4.el6uek
  • H
Improper Synchronization

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2021-47118

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2023-52703

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-35922

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-36919

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-36960

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2023-52628

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26816

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26772

<0:4.1.12-124.89.4.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26675

<0:4.1.12-124.89.4.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2023-52881

<0:4.1.12-124.89.4.el6uek
  • H
Use After Free

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26801

<0:4.1.12-124.89.4.el6uek
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.12-124.89.4.el6uek
  • H
Improper Locking

<0:4.1.12-124.89.4.el6uek
  • H
Memory Leak

<0:4.1.12-124.89.4.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2021-47236

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26679

<0:4.1.12-124.89.4.el6uek
  • H
Memory Leak

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-26704

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-36016

<0:4.1.12-124.89.4.el6uek
  • H
CVE-2024-36950

<0:4.1.12-124.89.4.el6uek
  • H
Use of Uninitialized Resource

<0:4.1.12-124.88.3.el6uek
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.1.12-124.88.3.el6uek
  • H
CVE-2024-36934

<0:4.1.12-124.88.3.el6uek
  • H
Improper Handling of Exceptional Conditions

<0:4.1.12-124.88.3.el6uek
  • H
CVE-2024-36946

<0:4.1.12-124.88.3.el6uek
  • H
CVE-2023-52813

<0:4.1.12-124.88.3.el6uek
  • H
CVE-2024-36941

<0:4.1.12-124.88.3.el6uek
  • H
CVE-2021-47495

<0:4.1.12-124.88.3.el6uek
  • H
CVE-2024-26642

<0:4.1.12-124.88.3.el6uek
  • H
CVE-2023-52880

<0:4.1.12-124.88.3.el6uek
  • H
Race Condition

<0:4.1.12-124.88.3.el6uek
  • H
CVE-2024-41091

<0:4.1.12-124.87.2.2.el6uek
  • H
CVE-2024-41090

<0:4.1.12-124.87.2.2.el6uek
  • H
Use After Free

<0:4.1.12-124.85.1.el6uek
  • H
Use After Free

<0:4.1.12-124.84.2.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.84.2.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.84.2.el6uek
  • H
CVE-2021-34981

<0:4.1.12-124.83.2.el6uek
  • H
CVE-2022-48619

<0:4.1.12-124.83.2.el6uek
  • H
Use After Free

<0:4.1.12-124.83.2.el6uek
  • H
Memory Leak

<0:4.1.12-124.83.2.el6uek
  • H
Use After Free

<0:4.1.12-124.83.2.el6uek
  • H
Integer Overflow or Wraparound

<0:4.1.12-124.82.2.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.82.2.el6uek
  • H
Use After Free

<0:4.1.12-124.82.2.el6uek
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.1.12-124.82.2.el6uek
  • H
Incorrect Authorization

<0:4.1.12-124.82.2.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.81.2.el6uek
  • H
Use After Free

<0:4.1.12-124.81.2.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.81.2.el6uek
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.12-124.81.2.el6uek
  • H
Use After Free

<0:4.1.12-124.80.1.el6uek
  • H
Use After Free

<0:4.1.12-124.80.1.el6uek
  • H
Use After Free

<0:4.1.12-124.79.2.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.79.2.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.79.2.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.79.2.el6uek
  • H
Use After Free

<0:4.1.12-124.79.2.el6uek
  • H
Use After Free

<0:4.1.12-124.79.2.el6uek
  • H
CVE-2023-22024

<0:4.1.12-124.78.4.1.el6uek
  • H
Use After Free

<0:4.1.12-124.79.2.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.79.2.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.78.2.el6uek
  • H
Use After Free

<0:4.1.12-124.78.2.el6uek
  • H
CVE-2023-31084

<0:4.1.12-124.77.2.el6uek
  • H
Use After Free

<0:4.1.12-124.77.2.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.77.2.el6uek
  • H
Race Condition

<0:4.1.12-124.77.2.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.77.2.el6uek
  • H
Incorrect Calculation

<0:4.1.12-124.77.2.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.76.2.el6uek
  • H
Use After Free

<0:4.1.12-124.76.2.el6uek
  • H
Improper Locking

<0:4.1.12-124.76.2.el6uek
  • H
Use After Free

<0:4.1.12-124.76.2.el6uek
  • H
Use After Free

<0:4.1.12-124.76.2.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.75.3.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.75.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.75.3.el6uek
  • H
Use After Free

<0:4.1.12-124.75.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.75.3.el6uek
  • H
Use After Free

<0:4.1.12-124.75.3.el6uek
  • H
Race Condition

<0:4.1.12-124.76.2.el6uek
  • H
Improper Initialization

<0:4.1.12-124.74.2.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.74.2.el6uek
  • H
Use After Free

<0:4.1.12-124.74.2.el6uek
  • H
Double Free

<0:4.1.12-124.74.2.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.73.2.el6uek
  • H
Memory Leak

<0:4.1.12-124.73.2.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.73.2.el6uek
  • H
Use After Free

<0:4.1.12-124.77.2.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.73.2.el6uek
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.1.12-124.75.3.el6uek
  • H
Integer Overflow or Wraparound

<0:4.1.12-124.74.2.el6uek
  • H
Integer Overflow or Wraparound

<0:4.1.12-124.72.2.el6uek
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.1.12-124.72.2.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.72.2.el6uek
  • H
Incorrect Calculation of Buffer Size

<0:4.1.12-124.72.2.el6uek
  • H
Non-exit on Failed Initialization

<0:4.1.12-124.71.3.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.71.3.el6uek
  • H
Improper Resource Shutdown or Release

<0:4.1.12-124.71.3.el6uek
  • H
Race Condition

<0:4.1.12-124.71.3.el6uek
  • H
Use After Free

<0:4.1.12-124.71.3.el6uek
  • H
Access of Uninitialized Pointer

<0:4.1.12-124.71.3.el6uek
  • H
Race Condition

<0:4.1.12-124.70.2.el6uek
  • H
Use After Free

<0:4.1.12-124.70.2.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.70.2.el6uek
  • H
Improper Resource Shutdown or Release

<0:4.1.12-124.70.2.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.70.2.el6uek
  • H
Improper Synchronization

<0:4.1.12-124.69.5.el6uek
  • H
Memory Leak

<0:4.1.12-124.69.5.el6uek
  • H
Use After Free

<0:4.1.12-124.69.5.el6uek
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.1.12-124.70.2.el6uek
  • H
Use of Uninitialized Resource

<0:4.1.12-124.69.5.el6uek
  • H
Use After Free

<0:4.1.12-124.76.2.el6uek
  • H
Incorrect Conversion between Numeric Types

<0:4.1.12-124.69.5.el6uek
  • H
CVE-2022-20368

<0:4.1.12-124.69.5.el6uek
  • H
Memory Leak

<0:4.1.12-124.67.3.el6uek
  • H
Race Condition

<0:4.1.12-124.67.3.el6uek
  • H
CVE-2017-18270

<0:4.1.12-124.67.3.el6uek
  • H
Use After Free

<0:4.1.12-124.67.3.el6uek
  • H
Use After Free

<0:4.1.12-124.67.3.el6uek
  • H
Improper Authentication

<0:4.1.12-124.67.3.el6uek
  • H
CVE-2022-36879

<0:4.1.12-124.67.3.el6uek
  • H
CVE-2022-0850

<0:4.1.12-124.67.3.el6uek
  • H
Out-of-Bounds

<0:4.1.12-124.67.3.el6uek
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.1.12-124.79.2.el6uek
  • H
Race Condition

<0:4.1.12-124.66.3.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.66.3.el6uek
  • H
Race Condition

<0:4.1.12-124.66.3.el6uek
  • H
CVE-2022-21546

<0:4.1.12-124.66.3.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.66.3.el6uek
  • H
Double Free

<0:4.1.12-124.66.3.el6uek
  • H
Use After Free

<0:4.1.12-124.65.1.el6uek
  • H
Use After Free

<0:4.1.12-124.65.1.el6uek
  • H
Use After Free

<0:4.1.12-124.64.1.el6uek
  • H
Double Free

<0:4.1.12-124.64.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.78.2.el6uek
  • H
Double Free

<0:4.1.12-124.64.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.62.3.1.el6uek
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.1.12-124.67.3.el6uek
  • H
Use After Free

<0:4.1.12-124.66.3.el6uek
  • H
Improper Privilege Management

<0:4.1.12-124.73.2.el6uek
  • H
CVE-2021-43976

<0:4.1.12-124.67.3.el6uek
  • H
Use After Free

<0:4.1.12-124.62.3.el6uek
  • H
Information Exposure

<0:4.1.12-124.62.3.el6uek
  • H
Race Condition

<0:4.1.12-124.62.3.el6uek
  • H
Out-of-Bounds

<0:4.1.12-124.62.3.el6uek
  • H
Improper Locking

<0:4.1.12-124.62.3.el6uek
  • H
Memory Leak

<0:4.1.12-124.62.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.62.3.el6uek
  • H
ELSA-2018-4021

<0:4.1.12-61.63.1.el6uek
  • H
ELSA-2018-4011

<0:4.1.12-112.14.11.el6uek
  • H
ELSA-2018-4012

<0:4.1.12-94.7.8.el6uek
  • H
ELSA-2012-2021

<0:2.6.39-100.10.1.el6uek
  • H
ELSA-2012-2022

<0:2.6.39-200.24.1.el6uek
  • H
ELSA-2012-2025

<0:2.6.39-200.29.2.el6uek
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.1.12-124.66.3.el6uek
  • H
Missing Initialization of Resource

<0:4.1.12-124.62.3.el6uek
  • H
CVE-2022-26966

<0:4.1.12-124.61.2.el6uek
  • H
Use of Insufficiently Random Values

<0:4.1.12-124.61.2.el6uek
  • H
Improper Validation of Integrity Check Value

<0:4.1.12-124.61.2.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.60.1.el6uek
  • H
Use After Free

<0:4.1.12-124.60.1.el6uek
  • H
Missing Authorization

<0:4.1.12-124.65.1.el6uek
  • H
Improper Preservation of Permissions

<0:4.1.12-124.61.2.el6uek
  • H
Race Condition

<0:4.1.12-124.62.3.el6uek
  • H
Race Condition

<0:4.1.12-124.60.1.el6uek
  • H
Incorrect Calculation of Buffer Size

<0:4.1.12-124.59.1.2.el6uek
  • H
Use After Free

<0:4.1.12-124.57.1.el6uek
  • H
Arbitrary Code Injection

<0:4.1.12-124.54.6.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.56.1.el6uek
  • H
Directory Traversal

<0:4.1.12-124.56.1.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.54.6.1.el6uek
  • H
Race Condition

<0:4.1.12-124.54.6.1.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.54.6.1.el6uek
  • H
Missing Initialization of Resource

<0:4.1.12-124.54.6.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.54.6.el6uek
  • H
CVE-2020-27068

<0:4.1.12-124.54.6.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.54.6.el6uek
  • H
Use After Free

<0:4.1.12-124.54.6.el6uek
  • H
Improper Cleanup on Thrown Exception

<0:4.1.12-124.53.5.el6uek
  • H
Race Condition

<0:4.1.12-124.50.2.el6uek
  • H
Improper Initialization

<0:4.1.12-124.50.2.el6uek
  • H
Race Condition

<0:4.1.12-124.50.2.el6uek
  • H
Insufficient Comparison

<0:4.1.12-124.50.2.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.50.2.el6uek
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.12-124.50.2.el6uek
  • H
CVE-2021-26932

<0:4.1.12-124.48.3.1.el6uek
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.12-124.48.5.el6uek
  • H
CVE-2021-26930

<0:4.1.12-124.48.3.1.el6uek
  • H
Allocation of Resources Without Limits or Throttling

<0:4.1.12-124.46.4.1.el6uek
  • H
Use After Free

<0:4.1.12-124.46.4.1.el6uek
  • H
Race Condition

<0:4.1.12-124.60.1.el6uek
  • H
Use After Free

<0:4.1.12-124.47.3.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.47.3.el6uek
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.1.12-124.54.6.1.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.54.6.1.el6uek
  • H
Race Condition

<0:4.1.12-124.62.3.el6uek
  • H
Double Free

<0:4.1.12-124.57.1.el6uek
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.1.12-124.54.6.1.el6uek
  • H
CVE-2021-3732

<0:4.1.12-124.58.2.el6uek
  • H
CVE-2021-0129

<0:4.1.12-124.60.1.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.54.6.1.el6uek
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.1.12-124.54.6.1.el6uek
  • H
CVE-2020-24586

<0:4.1.12-124.54.6.1.el6uek
  • H
CVE-2020-26147

<0:4.1.12-124.54.6.1.el6uek
  • H
Improper Authentication

<0:4.1.12-124.54.6.1.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.54.6.1.el6uek
  • H
Improper Validation of Integrity Check Value

<0:4.1.12-124.54.6.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.52.4.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.52.4.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.54.6.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.54.6.1.el6uek
  • H
Use After Free

<0:4.1.12-124.54.6.1.el6uek
  • H
CVE-2021-29650

<0:4.1.12-124.50.2.el6uek
  • H
Race Condition

<0:4.1.12-124.54.6.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.53.5.el6uek
  • H
Integer Overflow or Wraparound

<0:4.1.12-124.52.5.el6uek
  • H
Use After Free

<0:4.1.12-124.46.3.el6uek
  • H
Race Condition

<0:4.1.12-124.53.5.el6uek
  • H
Use After Free

<0:4.1.12-124.52.4.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.48.5.el6uek
  • H
Improper Initialization

<0:4.1.12-124.50.2.el6uek
  • H
Use After Free

<0:4.1.12-124.47.3.el6uek
  • H
Use After Free

<0:4.1.12-124.50.2.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.49.3.1.el6uek
  • H
CVE-2021-27363

<0:4.1.12-124.49.3.1.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.48.6.el6uek
  • H
Directory Traversal

<0:4.1.12-124.46.4.1.el6uek
  • H
Use After Free

<0:4.1.12-124.46.3.el6uek
  • H
Out-of-bounds Read

<0:2.6.39-400.330.1.el6uek
  • H
Use of Insufficiently Random Values

<0:4.1.12-124.46.3.el6uek
  • H
Use After Free

<0:4.1.12-124.46.3.el6uek
  • H
Use After Free

<0:4.1.12-124.54.6.1.el6uek
  • H
CVE-2020-27673

<0:4.1.12-124.46.4.1.el6uek
  • H
Out-of-bounds Read

<0:2.6.39-400.330.1.el6uek
  • H
Information Exposure

<0:4.1.12-124.45.6.el6uek
  • H
Improper Synchronization

<0:4.1.12-124.46.3.el6uek
  • H
Numeric Errors

<0:2.6.39-400.327.1.el6uek
  • H
CVE-2020-8694

<0:4.1.12-124.44.4.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.67.3.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.44.4.el6uek
  • H
CVE-2020-26541

<0:4.1.12-124.44.4.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.44.4.el6uek
  • H
Integer Underflow

<0:2.6.39-400.326.1.el6uek
  • H
Use After Free

<0:4.1.12-124.43.4.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.43.4.el6uek
  • H
Double Free

<0:4.1.12-124.43.4.el6uek
  • H
Use After Free

<0:4.1.12-124.43.4.el6uek
  • H
Incorrect Authorization

<0:4.1.12-124.43.4.el6uek
  • H
Race Condition

<0:3.8.13-118.50.1.el6uek
  • H
Improper Resource Shutdown or Release

<0:2.6.39-400.327.1.el6uek
  • H
Race Condition

<0:4.1.12-124.43.4.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.43.4.el6uek
  • H
Memory Leak

<0:4.1.12-124.43.4.el6uek
  • H
Improper Locking

<0:4.1.12-124.56.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.43.4.el6uek
  • H
Use of Uninitialized Resource

<0:4.1.12-124.42.3.el6uek
  • H
Memory Leak

<0:4.1.12-124.56.1.el6uek
  • H
CVE-2019-17075

<0:4.1.12-124.43.4.el6uek
  • H
Improper Authentication

<0:4.1.12-124.43.4.el6uek
  • H
Race Condition

<0:4.1.12-124.54.6.1.el6uek
  • H
Use After Free

<0:4.1.12-124.43.4.el6uek
  • H
Resource Exhaustion

<0:3.8.13-118.49.1.el6uek
  • H
Memory Leak

<0:4.1.12-124.42.3.el6uek
  • H
Error Handling

<0:4.1.12-124.42.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.46.3.el6uek
  • H
Race Condition

<0:4.1.12-124.41.4.el6uek
  • H
Missing Initialization of Resource

<0:4.1.12-124.40.6.el6uek
  • H
Memory Leak

<0:3.8.13-118.48.1.el6uek
  • H
Race Condition

<0:4.1.12-124.46.3.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.40.6.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.43.4.el6uek
  • H
Use After Free

<0:4.1.12-124.40.6.el6uek
  • H
Use After Free

<0:4.1.12-124.69.5.el6uek
  • H
Use After Free

<0:4.1.12-124.46.3.el6uek
  • H
Use After Free

<0:4.1.12-124.39.5.el6uek
  • H
Stack-based Buffer Overflow

<0:4.1.12-124.39.5.el6uek
  • H
Use After Free

<0:3.8.13-118.46.1.el6uek
  • H
CVE-2019-0139

<0:4.1.12-124.39.1.el6uek
  • H
CVE-2017-1000370

<0:4.1.12-124.39.5.el6uek
  • H
Resource Management Errors

<0:3.8.13-118.46.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.39.5.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.39.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.39.5.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.43.4.el6uek
  • H
Improper Input Validation

<0:3.8.13-118.45.1.el6uek
  • H
Memory Leak

<0:4.1.12-124.43.4.el6uek
  • H
Out-of-bounds Write

<0:2.6.39-400.322.1.el6uek
  • H
Improper Handling of Exceptional Conditions

<0:4.1.12-124.39.1.el6uek
  • H
Use of Uninitialized Resource

<0:4.1.12-124.39.1.el6uek
  • H
Information Exposure

<0:4.1.12-124.38.1.el6uek
  • H
Memory Leak

<0:4.1.12-124.38.1.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.39.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.36.3.el6uek
  • H
Information Exposure

<0:4.1.12-124.39.1.el6uek
  • H
Information Exposure

<0:4.1.12-124.44.4.1.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.50.1.el6uek
  • H
Use of Insufficiently Random Values

<0:4.1.12-124.45.6.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.44.4.el6uek
  • H
Out-of-bounds Read

<0:2.6.39-400.328.1.el6uek
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.1.12-124.43.4.el6uek
  • H
CVE-2019-20811

<0:4.1.12-124.42.3.el6uek
  • H
Race Condition

<0:4.1.12-124.54.6.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.39.5.el6uek
  • H
Memory Leak

<0:4.1.12-124.39.1.el6uek
  • H
Use After Free

<0:4.1.12-124.39.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.43.4.el6uek
  • H
Missing Initialization of Resource

<0:4.1.12-124.52.4.el6uek
  • H
NULL Pointer Dereference

<0:3.8.13-118.50.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.38.1.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.39.1.el6uek
  • H
Use After Free

<0:4.1.12-124.46.3.el6uek
  • H
Use After Free

<0:4.1.12-124.39.5.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.46.3.el6uek
  • H
Use After Free

<0:4.1.12-124.39.1.el6uek
  • H
Use After Free

<0:4.1.12-124.39.1.el6uek
  • H
Use After Free

<0:4.1.12-124.44.4.el6uek
  • H
Use After Free

<0:2.6.39-400.323.1.el6uek
  • H
CVE-2020-12770

<0:4.1.12-124.67.3.el6uek
  • H
Memory Leak

<0:4.1.12-124.56.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.39.5.el6uek
  • H
Memory Leak

<0:3.8.13-118.48.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.36.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.35.1.el6uek
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.1.12-124.43.4.el6uek
  • H
Race Condition

<0:2.6.39-400.323.1.el6uek
  • H
Memory Leak

<0:3.8.13-118.42.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.47.3.el6uek
  • H
Information Exposure

<0:4.1.12-124.36.4.el6uek
  • H
Incomplete Cleanup

<0:4.1.12-124.39.5.1.el6uek
  • H
Improper Handling of Exceptional Conditions

<0:4.1.12-124.41.4.el6uek
  • H
Double Free

<0:4.1.12-124.35.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.46.3.el6uek
  • H
Use After Free

<0:4.1.12-124.43.4.el6uek
  • H
Cleartext Transmission of Sensitive Information

<0:4.1.12-124.43.4.el6uek
  • H
Memory Leak

<0:4.1.12-124.56.1.el6uek
  • H
Memory Leak

<0:3.8.13-118.50.1.el6uek
  • H
Missing Initialization of Resource

<0:4.1.12-124.40.6.el6uek
  • H
Memory Leak

<0:4.1.12-124.39.5.el6uek
  • H
Missing Release of Resource after Effective Lifetime

<0:2.6.39-400.324.1.el6uek
  • H
Use of Uninitialized Resource

<0:4.1.12-124.42.3.el6uek
  • H
Race Condition

<0:4.1.12-124.54.6.el6uek
  • H
Release of Invalid Pointer or Reference

<0:4.1.12-124.49.3.1.el6uek
  • H
Use After Free

<0:2.6.39-400.322.1.el6uek
  • H
Improper Locking

<0:4.1.12-124.56.1.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.43.4.el6uek
  • H
Inadequate Encryption Strength

<0:4.1.12-124.42.3.el6uek
  • H
Heap-based Buffer Overflow

<0:4.1.12-124.39.1.el6uek
  • H
Race Condition

<0:4.1.12-124.43.4.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.54.6.1.el6uek
  • H
Heap-based Buffer Overflow

<0:4.1.12-124.39.1.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.36.1.el6uek
  • H
Heap-based Buffer Overflow

<0:4.1.12-124.46.3.el6uek
  • H
Heap-based Buffer Overflow

<0:4.1.12-124.39.1.el6uek
  • H
Heap-based Buffer Overflow

<0:4.1.12-124.36.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.34.1.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.316.1.el6uek
  • H
Out-of-bounds Write

<0:3.8.13-118.40.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.316.1.el6uek
  • H
Memory Leak

<0:4.1.12-124.33.4.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.317.1.el6uek
  • H
Use After Free

<0:2.6.39-400.317.1.el6uek
  • H
Incorrect Default Permissions

<0:2.6.39-400.317.1.el6uek
  • H
Out-of-Bounds

<0:4.1.12-124.33.4.el6uek
  • H
Use After Free

<0:3.8.13-118.41.1.el6uek
  • H
Memory Leak

<0:4.1.12-124.33.4.el6uek
  • H
Information Exposure

<0:4.1.12-124.32.3.el6uek
  • H
Missing Authorization

<0:2.6.39-400.317.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.316.1.el6uek
  • H
Divide By Zero

<0:2.6.39-400.316.1.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.315.1.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.39.1.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.32.1.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.39.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.30.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.29.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.29.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.28.6.el6uek
  • H
Race Condition

<0:4.1.12-124.28.1.el6uek
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.12-124.28.1.el6uek
  • H
Race Condition

<0:4.1.12-124.28.1.el6uek
  • H
CVE-2016-3139

<0:3.8.13-118.34.1.el6uek
  • H
Divide By Zero

<0:4.1.12-124.27.1.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.27.1.el6uek
  • H
Race Condition

<0:2.6.39-400.311.1.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.34.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.26.7.el6uek
  • H
Out-of-bounds Write

<0:3.8.13-118.32.1.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.32.1.el6uek
  • H
Out-of-bounds Write

<0:2.6.39-400.308.1.el6uek
  • H
Use After Free

<0:3.8.13-118.31.1.el6uek
  • H
Information Exposure

<0:4.1.12-124.26.1.el6uek
  • H
Missing Authorization

<0:3.8.13-118.31.1.el6uek
  • H
CVE-2017-18204

<0:3.8.13-118.30.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.25.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.306.1.el6uek
  • H
Missing Authorization

<0:3.8.13-118.29.1.el6uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.305.1.el6uek
  • H
Integer Overflow or Wraparound

<0:4.1.12-124.24.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.24.1.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.24.1.el6uek
  • H
Race Condition

<0:3.8.13-118.29.1.el6uek
  • H
Double Free

<0:4.1.12-124.24.1.el6uek
  • H
Use After Free

<0:3.8.13-118.39.1.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.32.3.2.el6uek
  • H
CVE-2019-11135

<0:2.6.39-400.316.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.57.1.el6uek
  • H
CVE-2019-11884

<0:3.8.13-118.35.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.32.1.el6uek
  • H
Inadequate Encryption Strength

<0:4.1.12-124.42.3.el6uek
  • H
Resource Exhaustion

<0:4.1.12-124.43.4.el6uek
  • H
Out-of-bounds Read

<0:2.6.39-400.311.1.el6uek
  • H
Resource Exhaustion

<0:3.8.13-118.40.1.el6uek
  • H
Memory Leak

<0:2.6.39-400.319.1.el6uek
  • H
Use After Free

<0:4.1.12-124.24.3.el6uek
  • H
Use After Free

<0:4.1.12-124.43.4.el6uek
  • H
Buffer Overflow

<0:4.1.12-124.33.4.el6uek
  • H
Improper Input Validation

<0:3.8.13-118.45.1.el6uek
  • H
Heap-based Buffer Overflow

<0:4.1.12-124.43.4.el6uek
  • H
Use After Free

<0:4.1.12-124.43.4.el6uek
  • H
CVE-2019-1125

<0:2.6.39-400.314.1.el6uek
  • H
Cleartext Transmission of Sensitive Information

<0:4.1.12-124.73.2.el6uek
  • H
Integer Overflow or Wraparound

<0:4.1.12-124.24.1.el6uek
  • H
CVE-2019-7222

<0:4.1.12-124.43.4.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.28.1.el6uek
  • H
Out-of-bounds Write

<0:2.6.39-400.305.1.el6uek
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.12-124.54.6.1.el6uek
  • H
Incomplete Cleanup

<0:4.1.12-124.39.5.el6uek
  • H
Use After Free

<0:4.1.12-124.56.1.el6uek
  • H
Integer Overflow or Wraparound

<0:3.8.13-118.31.1.el6uek
  • H
Use of Uninitialized Resource

<0:4.1.12-124.29.3.el6uek
  • H
Use After Free

<0:4.1.12-124.28.1.el6uek
  • H
Use After Free

<0:3.8.13-118.49.1.el6uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.312.2.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.66.3.el6uek
  • H
Allocation of Resources Without Limits or Throttling

<0:2.6.39-400.312.2.el6uek
  • H
Resource Exhaustion

<0:4.1.12-124.33.4.el6uek
  • H
Information Exposure

<0:2.6.39-400.312.1.el6uek
  • H
CVE-2019-11091

<0:2.6.39-400.312.1.el6uek
  • H
Information Exposure

<0:3.8.13-118.35.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.312.1.el6uek
  • H
Use After Free

<0:4.1.12-124.43.4.el6uek
  • H
Race Condition

<0:4.1.12-124.43.4.el6uek
  • H
Incorrect Type Conversion or Cast

<0:3.8.13-118.31.1.el6uek
  • H
Race Condition

<0:3.8.13-118.30.1.el6uek
  • H
Race Condition

<0:4.1.12-124.28.6.el6uek
  • H
Race Condition

<0:4.1.12-124.26.1.el6uek
  • H
Incorrect Authorization

<0:4.1.12-124.24.5.el6uek
  • H
Incorrect Type Conversion or Cast

<0:4.1.12-124.23.2.el6uek
  • H
CVE-2018-10021

<0:3.8.13-118.29.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.23.2.el6uek
  • H
Improper Access Control

<0:3.8.13-118.29.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.23.1.el6uek
  • H
Out-of-Bounds

<0:3.8.13-118.29.1.el6uek
  • H
Information Exposure

<0:3.8.13-118.29.1.el6uek
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.1.12-124.23.1.el6uek
  • H
Out-of-bounds Write

<0:3.8.13-118.29.1.el6uek
  • H
CVE-2018-1000204

<0:3.8.13-118.29.1.el6uek
  • H
Information Exposure

<0:3.8.13-118.29.1.el6uek
  • H
Use After Free

<0:4.1.12-124.20.1.el6uek
  • H
Use After Free

<0:4.1.12-124.20.7.el6uek
  • H
Incorrect Permission Assignment for Critical Resource

<0:3.8.13-118.29.1.el6uek
  • H
CVE-2018-15572

<0:4.1.12-124.20.7.el6uek
  • H
Information Exposure

<0:3.8.13-118.25.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.302.2.el6uek
  • H
Information Exposure

<0:3.8.13-118.25.1.el6uek
  • H
Race Condition

<0:4.1.12-124.19.5.el6uek
  • H
Improper Initialization

<0:4.1.12-124.19.1.el6uek
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.12-124.18.9.el6uek
  • H
Information Exposure

<0:4.1.12-124.18.9.el6uek
  • H
Information Exposure

<0:3.8.13-118.22.1.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.300.2.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.300.2.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.299.3.el6uek
  • H
CVE-2016-2543

<0:3.8.13-118.21.4.el6uek
  • H
Race Condition

<0:2.6.39-400.299.3.el6uek
  • H
Race Condition

<0:2.6.39-400.299.3.el6uek
  • H
Race Condition

<0:2.6.39-400.299.3.el6uek
  • H
NULL Pointer Dereference

<0:3.8.13-118.21.4.el6uek
  • H
Improper Input Validation

<0:3.8.13-118.21.4.el6uek
  • H
NULL Pointer Dereference

<0:3.8.13-118.23.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.67.3.el6uek
  • H
Information Exposure

<0:4.1.12-124.15.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.15.1.el6uek
  • H
Out-of-bounds Read

<0:2.6.39-400.299.1.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.14.2.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.21.1.el6uek
  • H
CVE-2018-100199

<0:3.8.13-118.20.6.el6uek
  • H
Out-of-bounds Write

<0:2.6.39-400.299.1.el6uek
  • H
Information Exposure

<0:4.1.12-124.14.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.299.1.el6uek
  • H
Race Condition

<0:4.1.12-124.14.2.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.14.1.el6uek
  • H
Out-of-bounds Read

<0:2.6.39-400.300.2.el6uek
  • H
Use After Free

<0:4.1.12-112.14.14.el6uek
  • H
Race Condition

<0:4.1.12-112.14.14.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-112.14.2.el6uek
  • H
Out-of-Bounds

<0:3.8.13-118.20.3.el6uek
  • H
Use After Free

<0:3.8.13-118.20.3.el6uek
  • H
Use After Free

<0:4.1.12-112.16.7.el6uek
  • H
Out-of-bounds Read

<0:2.6.39-400.298.3.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-112.14.2.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.20.3.el6uek
  • H
Out-of-Bounds

<0:4.1.12-112.14.2.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-112.14.2.el6uek
  • H
Stack-based Buffer Overflow

<0:4.1.12-124.28.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.305.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.306.1.el6uek
  • H
Out-of-Bounds

<0:3.8.13-118.29.1.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.57.1.el6uek
  • H
Out-of-bounds Write

<0:4.1.12-124.26.1.el6uek
  • H
Out-of-bounds Write

<0:3.8.13-118.32.1.el6uek
  • H
Use After Free

<0:3.8.13-118.29.1.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-124.18.5.el6uek
  • H
Use After Free

<0:3.8.13-118.32.1.el6uek
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.12-124.28.6.el6uek
  • H
Missing Release of Resource after Effective Lifetime

<0:3.8.13-118.29.1.el6uek
  • H
Improper Input Validation

<0:3.8.13-118.29.1.el6uek
  • H
Improper Privilege Management

<0:3.8.13-118.24.1.el6uek
  • H
Integer Overflow or Wraparound

<0:3.8.13-118.22.1.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.18.5.el6uek
  • H
Integer Overflow or Wraparound

<0:3.8.13-118.24.3.el6uek
  • H
Information Exposure

<0:4.1.12-124.18.5.el6uek
  • H
CVE-2018-3646

<0:4.1.12-124.18.5.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.304.1.el6uek
  • H
Use After Free

<0:4.1.12-112.14.14.el6uek
  • H
Resource Exhaustion

<0:4.1.12-124.19.2.el6uek
  • H
Use After Free

<0:3.8.13-118.24.1.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.22.1.el6uek
  • H
Improper Input Validation

<0:4.1.12-124.17.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.299.3.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.300.2.el6uek
  • H
Information Exposure

<0:4.1.12-124.25.1.el6uek
  • H
Use After Free

<0:4.1.12-124.16.2.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.299.3.el6uek
  • H
CVE-2018-1087

<0:4.1.12-124.14.5.el6uek
  • H
Out-of-bounds Write

<0:2.6.39-400.299.1.el6uek
  • H
Race Condition

<0:4.1.12-124.14.5.el6uek
  • H
Information Exposure

<0:4.1.12-124.15.2.el6uek
  • H
Use After Free

<0:4.1.12-112.14.14.el6uek
  • H
Out-of-bounds Write

<0:2.6.39-400.299.1.el6uek
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.1.12-112.14.13.el6uek
  • H
Race Condition

<0:3.8.13-118.29.1.el6uek
  • H
Missing Authorization

<0:4.1.12-124.15.1.el6uek
  • H
Information Exposure

<0:4.1.12-124.15.1.el6uek
  • H
Use After Free

<0:4.1.12-124.44.4.el6uek
  • H
Integer Overflow or Wraparound

<0:3.8.13-118.23.1.el6uek
  • H
Information Exposure

<0:4.1.12-112.14.14.el6uek
  • H
Race Condition

<0:4.1.12-124.15.1.el6uek
  • H
Race Condition

<0:2.6.39-400.313.1.el6uek
  • H
Use After Free

<0:3.8.13-118.29.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.313.1.el6uek
  • H
Integer Overflow or Wraparound

<0:4.1.12-124.15.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-124.15.1.el6uek
  • H
Incorrect Calculation

<0:4.1.12-124.24.1.el6uek
  • H
Improper Handling of Exceptional Conditions

<0:4.1.12-112.16.7.el6uek
  • H
Improper Resource Shutdown or Release

<0:4.1.12-124.67.3.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-112.14.14.el6uek
  • H
Access Restriction Bypass

<0:4.1.12-112.14.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.298.2.el6uek
  • H
Use After Free

<0:4.1.12-103.10.1.el6uek
  • H
Information Exposure

<0:4.1.12-124.28.6.el6uek
  • H
Information Exposure

<0:2.6.39-400.298.2.el6uek
  • H
Improper Input Validation

<0:4.1.12-103.9.4.el6uek
  • H
Race Condition

<0:4.1.12-103.10.1.el6uek
  • H
Divide By Zero

<0:3.8.13-118.34.1.el6uek
  • H
Resource Exhaustion

<0:4.1.12-103.10.1.el6uek
  • H
Race Condition

<0:4.1.12-103.10.1.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-103.9.4.el6uek
  • H
Buffer Overflow

<0:2.6.39-400.297.12.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-118.19.12.el6uek
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.12-103.9.2.el6uek
  • H
Use After Free

<0:2.6.39-400.297.12.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.19.12.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.297.12.el6uek
  • H
CVE-2017-12154

<0:4.1.12-103.9.2.el6uek
  • H
Integer Overflow or Wraparound

<0:3.8.13-118.20.3.el6uek
  • H
CVE-2017-1000365

<0:2.6.39-400.297.8.el6uek
  • H
Code

<0:2.6.39-400.297.5.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.297.5.el6uek
  • H
Race Condition

<0:2.6.39-400.297.5.el6uek
  • H
Incorrect Calculation

<0:2.6.39-400.297.8.el6uek
  • H
Out-of-bounds Write

<0:2.6.39-400.297.12.el6uek
  • H
Numeric Errors

<0:2.6.39-400.297.5.el6uek
  • H
CVE-2017-7273

<0:4.1.12-94.5.7.el6uek
  • H
CVE-2017-5669

<0:2.6.39-400.295.2.el6uek
  • H
NULL Pointer Dereference

<0:3.8.13-118.18.2.el6uek
  • H
CVE-2015-9731

<0:3.8.13-118.18.2.el6uek
  • H
CVE-2015-5257

<0:2.6.39-400.295.2.el6uek
  • H
Resource Management Errors

<0:2.6.39-400.295.2.el6uek
  • H
Improperly Implemented Security Check for Standard

<0:2.6.39-400.294.7.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-61.1.34.el6uek
  • H
Information Exposure

<0:2.6.39-400.294.6.el6uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.294.6.el6uek
  • H
Information Exposure

<0:3.8.13-118.17.4.el6uek
  • H
Information Exposure

<0:3.8.13-118.17.4.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-61.1.33.el6uek
  • H
Information Exposure

<0:4.1.12-61.1.33.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.294.6.el6uek
  • H
CVE-2016-3140

<0:2.6.39-400.294.6.el6uek
  • H
Security Features

<0:2.6.39-400.294.6.el6uek
  • H
Improper Data Handling

<0:4.1.12-61.1.33.el6uek
  • H
Improper Input Validation

<0:3.8.13-118.17.4.el6uek
  • H
Out-of-Bounds

<0:4.1.12-61.1.33.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.294.6.el6uek
  • H
Race Condition

<0:2.6.39-400.294.2.el6uek
  • H
CVE-2016-3951

<0:4.1.12-61.1.33.el6uek
  • H
Information Exposure

<0:2.6.39-400.294.2.el6uek
  • H
CVE-2013-7446

<0:2.6.39-400.294.2.el6uek
  • H
Information Exposure

<0:4.1.12-61.1.27.el6uek
  • H
Race Condition

<0:2.6.39-400.294.1.el6uek
  • H
Resource Exhaustion

<0:4.1.12-61.1.25.el6uek
  • H
Information Exposure

<0:2.6.39-400.297.12.el6uek
  • H
Divide By Zero

<0:3.8.13-118.20.3.el6uek
  • H
Out-of-bounds Write

<0:3.8.13-118.19.10.el6uek
  • H
Race Condition

<0:4.1.12-103.7.4.el6uek
  • H
CVE-2017-7184

<0:2.6.39-400.295.2.el6uek
  • H
Use After Free

<0:2.6.39-400.297.11.el6uek
  • M
Out-of-Bounds

<0:4.1.12-103.7.3.el6uek
  • H
Integer Overflow or Wraparound

<0:3.8.13-118.19.10.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.297.9.el6uek
  • H
Out-of-bounds Write

<0:2.6.39-400.297.8.el6uek
  • H
Race Condition

<0:4.1.12-94.5.9.el6uek
  • H
CVE-2017-2671

<0:2.6.39-400.298.1.el6uek
  • H
Improper Verification of Cryptographic Signature

<0:2.6.39-400.297.6.el6uek
  • H
Resource Exhaustion

<0:2.6.39-400.297.6.el6uek
  • H
Resource Exhaustion

<0:2.6.39-400.304.1.el6uek
  • H
Race Condition

<0:4.1.12-61.1.33.el6uek
  • H
CVE-2017-9075

<0:3.8.13-118.19.12.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.295.2.el6uek
  • H
Resource Exhaustion

<0:4.1.12-94.5.9.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-61.1.33.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.298.3.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.297.6.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.294.6.el6uek
  • H
Missing Release of Resource after Effective Lifetime

<0:4.1.12-61.1.33.el6uek
  • H
NULL Pointer Dereference

<0:3.8.13-118.17.4.el6uek
  • H
Error Handling

<0:4.1.12-61.1.33.el6uek
  • H
Double Free

<0:4.1.12-94.3.5.el6uek
  • H
Race Condition

<0:4.1.12-61.1.25.el6uek
  • H
Error Handling

<0:3.8.13-118.22.1.el6uek
  • H
CVE-2017-9077

<0:2.6.39-400.297.12.el6uek
  • H
Incorrect Permission Assignment for Critical Resource

<0:2.6.39-400.298.1.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.20.3.el6uek
  • H
Improper Access Control

<0:2.6.39-400.294.6.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.297.6.el6uek
  • H
Out-of-Bounds

<0:4.1.12-94.3.8.el6uek
  • H
Improper Input Validation

<0:3.8.13-118.19.2.el6uek
  • H
Out-of-Bounds

<0:3.8.13-118.18.2.el6uek
  • H
Out-of-bounds Read

<0:3.8.13-118.18.2.el6uek
  • H
CVE-2017-2583

<0:3.8.13-118.18.2.el6uek
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.39-400.295.2.el6uek
  • H
Incorrect Conversion between Numeric Types

<0:2.6.39-400.297.12.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.297.4.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.294.2.el6uek
  • H
Race Condition

<0:3.8.13-118.18.2.el6uek
  • H
Off-by-one Error

<0:4.1.12-103.9.4.el6uek
  • H
Improper Authorization

<0:3.8.13-118.19.3.el6uek
  • H
Improper Access Control

<0:3.8.13-118.17.4.el6uek
  • H
Use After Free

<0:4.1.12-61.1.33.el6uek
  • H
Out-of-Bounds

<0:4.1.12-61.1.25.el6uek
  • H
Use After Free

<0:2.6.39-400.294.7.el6uek
  • H
Code

<0:3.8.13-118.17.4.el6uek
  • H
Out-of-Bounds

<0:3.8.13-118.16.2.el6uek
  • H
Race Condition

<0:2.6.39-400.294.6.el6uek
  • H
Use After Free

<0:4.1.12-61.1.27.el6uek
  • H
Integer Overflow or Wraparound

<0:4.1.12-61.1.27.el6uek
  • H
Out-of-Bounds

<0:4.1.12-61.1.27.el6uek
  • H
Improper Access Control

<0:4.1.12-61.1.27.el6uek
  • H
Race Condition

<0:3.8.13-118.16.2.el6uek
  • H
Double Free

<0:2.6.39-400.294.3.el6uek
  • H
Use After Free

<0:3.8.13-118.16.2.el6uek
  • H
Improper Input Validation

<0:4.1.12-61.1.22.el6uek
  • H
Out-of-bounds Read

<0:4.1.12-61.1.22.el6uek
  • H
CVE-2015-8816

<0:4.1.12-61.1.6.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-61.1.6.el6uek
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.12-61.1.6.el6uek
  • H
Use After Free

<0:4.1.12-61.1.6.el6uek
  • H
Information Exposure

<0:4.1.12-61.1.6.el6uek
  • H
CVE-2016-4951

<0:4.1.12-61.1.6.el6uek
  • H
Information Exposure

<0:4.1.12-61.1.6.el6uek
  • H
Improper Input Validation

<0:4.1.12-37.6.1.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.293.2.el6uek
  • H
CVE-2016-0617

<0:4.1.12-32.2.3.el6uek
  • H
Improper Data Handling

<0:4.1.12-61.1.23.el6uek
  • H
CVE-2016-4794

<0:4.1.12-61.1.19.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.305.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.284.2.el6uek
  • H
Resource Management Errors

<0:4.1.12-61.1.6.el6uek
  • H
Race Condition

<0:2.6.39-400.290.2.el6uek
  • H
NULL Pointer Dereference

<0:3.8.13-118.14.2.el6uek
  • H
Information Exposure

<0:2.6.39-400.290.2.el6uek
  • H
CVE-2016-2384

<0:2.6.39-400.299.3.el6uek
  • H
Race Condition

<0:2.6.39-400.290.2.el6uek
  • H
CVE-2016-4581

<0:4.1.12-61.1.6.el6uek
  • H
Information Exposure

<0:2.6.39-400.290.2.el6uek
  • H
Cryptographic Issues

<0:3.8.13-118.14.2.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-118.14.2.el6uek
  • H
Improper Access Control

<0:4.1.12-37.6.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.283.1.el6uek
  • H
Race Condition

<0:4.1.12-61.1.6.el6uek
  • H
NULL Pointer Dereference

<0:4.1.12-61.1.19.el6uek
  • H
NULL Pointer Dereference

<0:3.8.13-118.14.2.el6uek
  • H
Resource Management Errors

<0:4.1.12-61.1.6.el6uek
  • H
Race Condition

<0:2.6.39-400.286.3.el6uek
  • H
Out-of-Bounds

<0:3.8.13-118.34.1.el6uek
  • H
Resource Management Errors

<0:4.1.12-61.1.14.el6uek
  • H
Out-of-Bounds

<0:4.1.12-61.1.13.el6uek
  • H
Out-of-Bounds

<0:4.1.12-61.1.13.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.284.2.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.284.2.el6uek
  • H
Information Exposure

<0:3.8.13-118.10.2.el6uek
  • H
CVE-2016-4470

<0:4.1.12-37.6.2.el6uek
  • H
Access Restriction Bypass

<0:4.1.12-37.6.2.el6uek
  • H
CVE-2016-0758

<0:3.8.13-118.6.2.el6uek
  • H
Access Restriction Bypass

<0:4.1.12-37.5.1.el6uek
  • H
CVE-2015-8324

<0:2.6.32-400.37.17.el6uek
  • H
CVE-2015-8543

<0:2.6.32-400.37.17.el6uek
  • H
Out-of-Bounds

<0:2.6.32-400.37.17.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.278.3.el6uek
  • H
Improper Input Validation

<0:2.6.32-400.37.17.el6uek
  • M
Race Condition

<0:2.6.39-400.278.2.el6uek
  • H
Improper Input Validation

<0:3.8.13-118.4.2.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-118.3.2.el6uek
  • H
CVE-2016-0728

<0:3.8.13-118.2.5.el6uek
  • H
CVE-2015-6937

<0:2.6.39-400.295.2.el6uek
  • M
Information Exposure

<0:2.6.32-400.37.10.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-98.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.250.2.el6uek
  • H
CVE-2014-8134

<0:3.8.13-68.el6uek
  • H
CVE-2014-7975

<0:3.8.13-68.el6uek
  • H
Improper Input Validation

<0:3.8.13-118.2.4.el6uek
  • H
Resource Management Errors

<0:2.6.39-400.264.13.el6uek
  • H
Resource Management Errors

<0:2.6.39-400.264.13.el6uek
  • H
Improper Privilege Management

<0:2.6.32-400.37.15.el6uek
  • H
Race Condition

<0:2.6.32-400.37.15.el6uek
  • H
Race Condition

<0:2.6.39-400.264.13.el6uek
  • H
Security Features

<0:3.8.13-118.29.1.el6uek
  • H
CVE-2015-2925

<0:3.8.13-118.2.4.el6uek
  • H
Improper Privilege Management

<0:2.6.32-400.37.15.el6uek
  • H
Out-of-Bounds

<0:3.8.13-118.2.1.el6uek
  • M
Out-of-Bounds

<0:2.6.39-400.264.5.el6uek
  • H
Race Condition

<0:3.8.13-98.2.2.el6uek
  • H
Code

<0:2.6.39-400.294.6.el6uek
  • H
Out-of-Bounds

<0:3.8.13-98.2.2.el6uek
  • H
Resource Management Errors

<0:3.8.13-98.1.2.el6uek
  • H
Resource Management Errors

<0:2.6.32-400.37.11.el6uek
  • M
CVE-2014-9715

<0:2.6.39-400.250.10.el6uek
  • M
Race Condition

<0:3.8.13-68.3.5.el6uek
  • M
Numeric Errors

<0:2.6.39-400.250.9.el6uek
  • M
Improper Privilege Management

<0:2.6.39-400.250.9.el6uek
  • M
Access Restriction Bypass

<0:2.6.32-400.37.9.el6uek
  • M
Code

<0:2.6.39-400.250.7.el6uek
  • M
CVE-2015-3636

<0:3.8.13-68.3.4.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-68.3.3.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.250.6.el6uek
  • H
Information Exposure

<0:2.6.39-400.250.5.el6uek
  • H
CVE-2014-9585

<0:2.6.32-400.37.5.el6uek
  • H
Resource Management Errors

<0:2.6.32-400.37.5.el6uek
  • H
CVE-2014-3610

<0:3.8.13-68.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-400.37.4.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.250.2.el6uek
  • H
Code

<0:3.8.13-118.el6uek
  • H
Race Condition

<0:3.8.13-68.1.3.el6uek
  • H
Resource Management Errors

<0:3.8.13-68.1.3.el6uek
  • H
Improper Input Validation

<0:2.6.32-400.37.4.el6uek
  • H
CVE-2015-1421

<0:2.6.32-400.37.3.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.249.3.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.248.3.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.248.3.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.248.3.el6uek
  • H
CVE-2014-8173

<0:3.8.13-55.1.8.el6uek
  • H
Out-of-bounds Read

<0:2.6.32-400.37.2.el6uek
  • H
Information Exposure

<0:2.6.32-400.37.2.el6uek
  • H
Out-of-Bounds

<0:3.8.13-55.1.8.el6uek
  • H
Resource Management Errors

<0:3.8.13-55.1.5.el6uek
  • H
Resource Management Errors

<0:3.8.13-55.1.5.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-118.el6uek
  • H
Code

<0:2.6.32-400.36.13.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-55.el6uek
  • H
CVE-2014-4171

<0:3.8.13-55.el6uek
  • H
Cryptographic Issues

<0:3.8.13-44.el6uek
  • H
Information Exposure

<0:3.8.13-44.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-44.el6uek
  • H
Buffer Overflow

<0:3.8.13-35.el6uek
  • H
Resource Management Errors

<0:3.8.13-35.1.3.el6uek
  • H
Improper Input Validation

<0:3.8.13-35.el6uek
  • H
Out-of-Bounds

<0:3.8.13-35.el6uek
  • H
Improper Input Validation

<0:3.8.13-35.el6uek
  • H
Improper Input Validation

<0:3.8.13-35.el6uek
  • H
Resource Management Errors

<0:3.8.13-26.el6uek
  • H
Out-of-Bounds

<0:3.8.13-26.el6uek
  • H
Resource Management Errors

<0:3.8.13-26.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-26.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-26.el6uek
  • H
Out-of-Bounds

<0:3.8.13-26.el6uek
  • H
Improper Input Validation

<0:3.8.13-26.el6uek
  • H
Numeric Errors

<0:3.8.13-26.el6uek
  • H
CVE-2013-2896

<0:3.8.13-26.el6uek
  • H
Out-of-Bounds

<0:3.8.13-26.el6uek
  • H
Out-of-Bounds

<0:3.8.13-26.el6uek
  • H
Cryptographic Issues

<0:3.8.13-26.el6uek
  • H
Improper Input Validation

<0:3.8.13-26.el6uek
  • H
Resource Management Errors

<0:2.6.32-400.36.13.el6uek
  • H
Improper Input Validation

<0:2.6.32-400.36.13.el6uek
  • H
Improper Input Validation

<0:3.8.13-26.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-400.36.13.el6uek
  • H
Improper Privilege Management

<0:2.6.32-400.36.13.el6uek
  • H
Out-of-Bounds

<0:3.8.13-55.1.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.215.14.el6uek
  • H
Information Exposure

<0:3.8.13-55.1.1.el6uek
  • H
Resource Management Errors

<0:2.6.39-400.215.14.el6uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.12.el6uek
  • H
Race Condition

<0:2.6.32-400.36.12.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.215.14.el6uek
  • H
Out-of-Bounds

<0:3.8.13-55.el6uek
  • H
Resource Management Errors

<0:3.8.13-55.1.1.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.215.14.el6uek
  • H
Resource Exhaustion

<0:2.6.32-400.36.11.el6uek
  • H
Improper Input Validation

<0:2.6.32-400.36.11.el6uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.10.el6uek
  • H
CVE-2014-3646

<0:3.8.13-44.1.4.el6uek
  • H
Race Condition

<0:2.6.32-400.36.10.el6uek
  • H
Improper Input Validation

<0:3.8.13-44.1.4.el6uek
  • H
Numeric Errors

<0:3.8.13-44.1.3.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.215.11.el6uek
  • H
Resource Exhaustion

<0:2.6.32-400.36.9.el6uek
  • H
Integer Overflow or Wraparound

<0:3.8.13-44.1.3.el6uek
  • H
Use After Free

<0:3.8.13-44.1.3.el6uek
  • H
Use After Free

<0:2.6.39-400.215.11.el6uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.9.el6uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.10.el6uek
  • H
Information Exposure

<0:2.6.32-400.36.8.el6uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.8.el6uek
  • H
CVE-2014-4667

<0:3.8.13-35.3.5.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-35.3.5.el6uek
  • H
Improper Input Validation

<0:2.6.32-400.36.6.el6uek
  • H
Race Condition

<0:3.8.13-35.3.3.el6uek
  • H
Improper Privilege Management

<0:2.6.39-400.215.4.el6uek
  • H
Race Condition

<0:2.6.39-400.215.4.el6uek
  • H
Numeric Errors

<0:2.6.39-400.215.3.el6uek
  • H
CVE-2014-3153

<0:2.6.32-400.36.2.el6uek
  • H
Out-of-bounds Read

<0:2.6.39-400.215.6.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.215.3.el6uek
  • H
Use After Free

<0:3.8.13-26.2.3.el6uek
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.32-400.36.3.el6uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.6.el6uek
  • H
Information Exposure

<0:2.6.32-400.36.3.el6uek
  • H
Race Condition

<0:2.6.39-400.215.6.el6uek
  • H
Out-of-bounds Write

<0:2.6.39-400.214.6.el6uek
  • H
Improper Input Validation

<0:2.6.32-400.34.4.el6uek
  • H
Out-of-Bounds

<0:3.8.13-26.2.2.el6uek
  • H
NULL Pointer Dereference

<0:2.6.32-400.34.4.el6uek
  • H
CVE-2014-0055

<0:3.8.13-26.2.2.el6uek
  • H
Resource Management Errors

<0:3.8.13-35.el6uek
  • H
Access Restriction Bypass

<0:3.8.13-26.2.4.el6uek
  • H
Improper Input Validation

<0:3.8.13-26.1.1.el6uek
  • H
Improper Input Validation

<0:3.8.13-26.1.1.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.214.3.el6uek
  • H
Numeric Errors

<0:3.8.13-16.2.3.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.209.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.209.1.el6uek
  • H
Resource Management Errors

<0:2.6.39-400.209.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.109.6.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.209.1.el6uek
  • H
Information Exposure

<0:2.6.39-400.209.1.el6uek
  • M
Out-of-Bounds

<0:2.6.32-400.29.1.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.109.1.el6uek
  • M
Resource Management Errors

<0:2.6.39-300.28.1.el6uek
  • H
Numeric Errors

<0:2.6.39-400.211.3.el6uek
  • H
Improper Input Validation

<0:3.8.13-16.2.3.el6uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-400.33.4.el6uek
  • H
Out-of-Bounds

<0:3.8.13-16.2.2.el6uek
  • H
Information Exposure

<0:2.6.32-400.33.3.el6uek
  • H
Resource Management Errors

<0:3.8.13-16.2.2.el6uek
  • H
Use of Externally-Controlled Format String

<0:2.6.39-400.109.6.el6uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.211.2.el6uek
  • H
Improper Input Validation

<0:2.6.32-400.33.3.el6uek
  • H
CVE-2013-0343

<0:2.6.32-400.33.3.el6uek
  • H
Numeric Errors

<0:2.6.32-400.33.3.el6uek
  • M
Information Exposure

<0:3.8.13-16.1.1.el6uek
  • H
Resource Management Errors

<0:2.6.32-400.33.4.el6uek
  • M
Resource Management Errors

<0:2.6.32-400.33.2.el6uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el6uek
  • H
CVE-2013-2206

<0:2.6.32-400.29.3.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.109.6.el6uek
  • M
Information Exposure

<0:2.6.39-400.109.3.el6uek
  • H
Resource Management Errors

<0:3.8.13-26.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.109.6.el6uek
  • H
Information Exposure

<0:2.6.32-400.33.3.el6uek
  • M
Resource Management Errors

<0:2.6.32-400.29.2.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.109.1.el6uek
  • M
CVE-2013-3301

<0:2.6.39-400.109.3.el6uek
  • M
Information Exposure

<0:2.6.39-400.109.3.el6uek
  • M
Use of Externally-Controlled Format String

<0:2.6.39-400.109.3.el6uek
  • M
Resource Management Errors

<0:2.6.39-400.109.3.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.109.1.el6uek
  • M
Access Restriction Bypass

<0:2.6.39-400.109.3.el6uek
  • H
Information Exposure

<0:2.6.39-400.109.6.el6uek
  • M
Information Exposure

<0:2.6.39-400.109.3.el6uek
  • H
Information Exposure

<0:2.6.39-400.211.2.el6uek
  • H
Information Exposure

<0:2.6.39-400.211.2.el6uek
  • M
Information Exposure

<0:2.6.39-400.109.3.el6uek
  • C
Numeric Errors

<0:2.6.39-400.24.1.el6uek
  • M
Improper Input Validation

<0:2.6.32-400.29.1.el6uek
  • M
Improper Input Validation

<0:2.6.39-300.28.1.el6uek
  • H
Numeric Errors

<0:2.6.39-400.21.1.el6uek
  • M
Information Exposure

<0:2.6.32-400.29.1.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-400.26.2.el6uek
  • H
Resource Management Errors

<0:2.6.39-400.21.2.el6uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el6uek
  • M
Out-of-Bounds

<0:2.6.39-300.28.1.el6uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el6uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.21.1.el6uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el6uek
  • H
Resource Management Errors

<0:2.6.39-400.21.2.el6uek
  • H
Race Condition

<0:2.6.39-400.21.2.el6uek
  • H
CVE-2013-1827

<0:2.6.32-400.26.2.el6uek
  • H
Out-of-Bounds

<0:2.6.39-400.21.2.el6uek
  • H
CVE-2013-1826

<0:2.6.32-400.26.2.el6uek
  • H
Improper Input Validation

<0:2.6.39-400.21.2.el6uek
  • H
Access Restriction Bypass

<0:2.6.39-400.17.2.el6uek
  • H
Numeric Errors

<0:2.6.39-400.17.1.el6uek
  • H
Race Condition

<0:2.6.32-400.26.2.el6uek
  • H
CVE-2013-0311

<0:2.6.39-400.17.1.el6uek
  • M
Improper Input Validation

<0:2.6.32-300.39.4.el6uek
  • H
Out-of-Bounds

<0:2.6.32-400.26.2.el6uek
  • M
Access Restriction Bypass

<0:2.6.32-400.29.1.el6uek
  • H
Out-of-Bounds

<0:2.6.32-400.26.2.el6uek
  • M
Information Exposure

<0:2.6.32-300.39.4.el6uek
  • M
CVE-2012-4461

<0:2.6.39-300.28.1.el6uek
  • M
Improper Input Validation

<0:2.6.39-300.28.1.el6uek
  • M
Numeric Errors

<0:2.6.39-300.17.3.el6uek
  • H
CVE-2012-5517

<0:2.6.32-400.26.2.el6uek
  • M
CVE-2012-4444

<0:2.6.32-300.39.2.el6uek
  • M
Numeric Errors

<0:2.6.39-300.17.3.el6uek
  • H
Race Condition

<0:2.6.32-400.26.2.el6uek
  • M
Out-of-bounds Write

<0:2.6.39-300.17.2.el6uek
  • M
Numeric Errors

<0:2.6.32-300.39.2.el6uek
  • M
Resource Management Errors

<0:2.6.32-300.39.1.el6uek
  • M
Race Condition

<0:2.6.39-300.17.2.el6uek
  • H
Numeric Errors

<0:2.6.39-200.34.1.el6uek
  • M
Resource Management Errors

<0:2.6.32-300.32.3.el6uek
  • M
Information Exposure

<0:2.6.32-300.32.3.el6uek
  • M
Access Restriction Bypass

<0:2.6.32-300.32.3.el6uek
  • H
Out-of-Bounds

<0:2.6.32-300.29.2.el6uek
  • H
CVE-2012-3375

<0:2.6.32-300.29.2.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-300.27.1.el6uek
  • H
Improper Input Validation

<0:2.6.32-300.27.1.el6uek
  • M
Resource Management Errors

<0:2.6.39-100.7.1.el6uek
  • M
Improper Input Validation

<0:2.6.32-300.21.1.el6uek
  • M
NULL Pointer Dereference

<0:2.6.39-100.6.1.el6uek
  • M
Resource Exhaustion

<0:2.6.32-300.21.1.el6uek
  • H
CVE-2012-0045

<0:2.6.32-300.11.1.el6uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-300.11.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.32-300.11.1.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-300.11.1.el6uek
  • H
Resource Exhaustion

<0:2.6.32-300.29.2.el6uek
  • H
CVE-2011-4622

<0:2.6.32-300.11.1.el6uek
  • M
Out-of-Bounds

<0:2.6.39-100.7.1.el6uek
  • H
Divide By Zero

<0:2.6.32-300.11.1.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-300.7.1.el6uek
  • H
CVE-2011-1493

<0:2.6.32-300.4.1.el6uek
  • H
Improper Input Validation

<0:2.6.32-300.11.1.el6uek
  • H
Out-of-Bounds

<0:2.6.32-300.11.1.el6uek
  • M
Information Exposure

<0:2.6.32-300.3.1.el6uek
  • M
Out-of-Bounds

<0:2.6.32-300.3.1.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-300.4.1.el6uek
  • M
CVE-2011-3638

<0:2.6.32-300.3.1.el6uek
  • M
Access Restriction Bypass

<0:2.6.32-300.3.1.el6uek
  • M
Information Exposure

<0:2.6.32-300.3.1.el6uek
  • H
Resource Management Errors

<0:2.6.32-200.23.1.el6uek
  • H
Resource Management Errors

<0:2.6.32-200.23.1.el6uek
  • H
Information Exposure

<0:2.6.32-200.23.1.el6uek
  • H
Buffer Overflow

<0:2.6.32-200.23.1.el6uek
  • H
Information Exposure

<0:2.6.32-200.23.1.el6uek
  • M
Access Restriction Bypass

<0:2.6.32-300.3.1.el6uek
  • H
Out-of-Bounds

<0:2.6.32-200.23.1.el6uek
  • H
CVE-2011-3188

<0:2.6.32-200.23.1.el6uek
  • H
CVE-2011-2699

<0:2.6.32-200.23.1.el6uek
  • H
Information Exposure

<0:2.6.32-200.20.1.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-200.20.1.el6uek
  • H
Resource Management Errors

<0:2.6.32-200.20.1.el6uek
  • H
Improper Input Validation

<0:2.6.32-200.20.1.el6uek
  • H
Numeric Errors

<0:2.6.32-200.20.1.el6uek
  • H
Out-of-Bounds

<0:2.6.32-200.19.1.el6uek
  • H
Race Condition

<0:2.6.32-200.19.1.el6uek
  • H
Access Restriction Bypass

<0:2.6.32-200.19.1.el6uek
  • H
Resource Exhaustion

<0:2.6.32-200.19.1.el6uek
  • M
Access Restriction Bypass

<0:2.6.32-300.3.1.el6uek
  • M
NULL Pointer Dereference

<0:2.6.32-300.3.1.el6uek
  • H
Integer Underflow

<0:2.6.32-200.19.1.el6uek
  • H
Off-by-one Error

<0:2.6.32-200.19.1.el6uek
  • M
Race Condition

<0:2.6.32-200.16.1.el6uek
  • M
CVE-2011-1767

<0:2.6.32-200.16.1.el6uek
  • H
Out-of-Bounds

<0:2.6.32-300.4.1.el6uek
  • H
Information Exposure

<0:2.6.32-200.19.1.el6uek
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-200.16.1.el6uek
  • H
Integer Underflow

<0:2.6.32-100.35.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.32-100.35.1.el6uek
  • H
NULL Pointer Dereference

<0:2.6.32-100.35.1.el6uek
  • H
Resource Exhaustion

<0:2.6.32-100.28.17.el6
  • H
Access Restriction Bypass

<0:2.6.32-100.28.15.el6
  • M
Out-of-Bounds

<0:2.6.32-300.3.1.el6uek
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-100.28.15.el6
  • H
Out-of-bounds Write

<0:2.6.32-100.28.15.el6
  • H
Numeric Errors

<0:2.6.32-100.28.17.el6
  • H
CVE-2011-1023

<0:2.6.32-100.28.17.el6
  • H
Information Exposure

<0:2.6.32-100.28.17.el6
  • H
Race Condition

<0:2.6.32-100.28.11.el6
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el6
  • H
Information Exposure

<0:2.6.32-100.28.17.el6
  • H
Improper Input Validation

<0:2.6.32-100.28.17.el6
  • H
Buffer Overflow

<0:2.6.32-100.28.15.el6
  • H
Incorrect Calculation

<0:2.6.32-100.28.15.el6
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el6
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el6
  • H
NULL Pointer Dereference

<0:2.6.32-100.28.15.el6
  • H
Improper Input Validation

<0:2.6.32-100.28.17.el6
  • H
Information Exposure

<0:2.6.32-100.28.15.el6
  • H
Information Exposure

<0:2.6.32-100.28.17.el6
  • H
CVE-2011-1019

<0:2.6.32-100.28.15.el6
  • H
Missing Initialization of Resource

<0:2.6.32-100.28.15.el6
  • H
Information Exposure

<0:2.6.32-100.28.15.el6
  • H
Buffer Overflow

<0:2.6.32-100.28.11.el6
  • H
Out-of-bounds Write

<0:2.6.32-100.28.11.el6
  • H
Out-of-Bounds

<0:2.6.32-100.28.11.el6
  • H
CVE-2010-4648

<0:2.6.32-100.28.11.el6
  • H
Resource Management Errors

<0:2.6.32-100.28.11.el6
  • H
NULL Pointer Dereference

<0:2.6.32-100.28.11.el6
  • H
NULL Pointer Dereference

<0:2.6.32-100.28.11.el6
  • H
Improper Initialization

<0:2.6.32-100.28.11.el6
  • H
Resource Exhaustion

<0:2.6.32-100.28.17.el6
  • H
Use After Free

<0:2.6.32-100.28.9.el6
  • H
Divide By Zero

<0:2.6.32-100.28.9.el6
  • H
Resource Exhaustion

<0:2.6.32-100.28.9.el6
  • H
Resource Exhaustion

<0:2.6.32-100.28.9.el6
  • H
Improper Input Validation

<0:2.6.32-300.7.1.el6uek