nss-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nss-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
ELSA-2014-1948

<0:3.16.2.3-1.el5_11
  • M
ELSA-2013-1861

<0:3.15.3-4.el5_10
  • H
ELSA-2013-0214

<0:3.13.6-3.el5_9
  • H
ELSA-2011-1444

<0:3.12.10-7.0.1.el5_7
  • H
ELSA-2011-1282

<0:3.12.10-4.0.1.el5_7
  • H
ELSA-2011-0472

<0:3.12.8-4.0.1.el5_6
  • C
Out-of-bounds Write

<0:3.21.3-2.0.1.el5_11
  • M
Improperly Implemented Security Check for Standard

<0:3.21.3-2.el5_11
  • M
CVE-2016-2834

<0:3.21.3-2.el5_11
  • M
NULL Pointer Dereference

<0:3.21.3-2.el5_11
  • M
CVE-2016-1979

<0:3.21.0-6.el5_11
  • M
CVE-2016-1978

<0:3.21.0-6.el5_11
  • C
Out-of-Bounds

<0:3.19.1-4.el5_11
  • C
Out-of-Bounds

<0:3.19.1-2.el5_11
  • C
Out-of-Bounds

<0:3.19.1-2.el5_11
  • C
Out-of-Bounds

<0:3.19.1-2.el5_11
  • M
Cryptographic Issues

<0:3.19.1-1.el5_11
  • M
Cryptographic Issues

<0:3.19.1-1.el5_11
  • H
Cryptographic Issues

<0:3.16.1-4.el5_11
  • M
Cryptographic Issues

<0:3.16.1-2.el5
  • M
Improper Input Validation

<0:3.16.1-2.el5
  • M
Inadequate Encryption Strength

<0:3.16.1-2.el5
  • C
CVE-2014-1544

<0:3.15.3-7.el5_10
  • M
CVE-2014-1545

<0:3.16.1-2.el5
  • M
Race Condition

<0:3.16.1-2.el5
  • H
Improper Input Validation

<0:3.15.3-3.el5_10
  • H
Numeric Errors

<0:3.15.3-3.el5_10
  • H
Access Restriction Bypass

<0:3.15.3-3.el5_10
  • H
Numeric Errors

<0:3.15.3-3.el5_10
  • H
CVE-2013-1739

<0:3.15.3-3.el5_10
  • M
Information Exposure

<0:3.14.3-6.el5_9
  • M
Out-of-Bounds

<0:3.14.3-6.el5_9
  • M
Out-of-Bounds

<0:3.13.5-4.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:3.12.8-1.0.1.el5
  • C
CVE-2010-3176

<0:3.12.8-1.0.1.el5
  • C
Out-of-Bounds

<0:3.12.8-1.0.1.el5
  • C
Out-of-Bounds

<0:3.12.7-2.0.1.el5
  • C
Out-of-Bounds

<0:3.12.7-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.12.8-1.0.1.el5
  • C
CVE-2010-3182

<0:3.12.8-1.0.1.el5
  • C
Resource Management Errors

<0:3.12.8-1.0.1.el5
  • C
Out-of-Bounds

<0:3.12.8-1.0.1.el5
  • C
Cryptographic Issues

<0:3.12.8-1.0.1.el5
  • C
Cryptographic Issues

<0:3.12.8-1.0.1.el5
  • C
Access Restriction Bypass

<0:3.12.7-2.0.1.el5
  • C
Numeric Errors

<0:3.12.7-2.0.1.el5
  • C
CVE-2010-3175

<0:3.12.8-1.0.1.el5
  • C
CVE-2010-3169

<0:3.12.7-2.0.1.el5
  • C
Out-of-Bounds

<0:3.12.7-2.0.1.el5
  • C
Resource Management Errors

<0:3.12.7-2.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.12.7-2.0.1.el5
  • C
Resource Management Errors

<0:3.12.7-2.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.12.7-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.12.7-2.0.1.el5
  • C
Arbitrary Code Injection

<0:3.12.7-2.0.1.el5
  • M
Improper Certificate Validation

<0:3.12.6-1.0.1.el5_4
  • C
Cryptographic Issues

<0:3.12.3.99.3-1.0.1.el5_3.2
  • C
Out-of-Bounds

<0:3.12.3.99.3-1.0.1.el5_3.2
  • C
Improper Certificate Validation

<0:3.12.3.99.3-1.el5_3.2
  • C
Link Following

<0:3.12.2.0-4.el5
  • C
Access Restriction Bypass

<0:3.12.2.0-4.el5
  • C
Resource Management Errors

<0:3.12.2.0-4.el5
  • C
Cross-site Scripting (XSS)

<0:3.12.2.0-4.el5
  • C
Resource Management Errors

<0:3.12.2.0-4.el5
  • C
Access Restriction Bypass

<0:3.12.2.0-4.el5
  • C
CVE-2008-5501

<0:3.12.2.0-2.el5
  • C
Information Exposure

<0:3.12.2.0-4.el5
  • C
Resource Management Errors

<0:3.12.2.0-2.el5
  • C
Information Exposure

<0:3.12.2.0-2.el5
  • C
CVE-2008-5510

<0:3.12.2.0-2.el5
  • C
Access Restriction Bypass

<0:3.12.2.0-2.el5
  • C
Access Restriction Bypass

<0:3.12.2.0-2.el5
  • C
Improper Input Validation

<0:3.12.2.0-2.el5
  • C
Access Restriction Bypass

<0:3.12.2.0-2.el5
  • C
Cross-site Scripting (XSS)

<0:3.12.2.0-2.el5
  • C
Resource Management Errors

<0:3.12.2.0-2.el5
  • C
Improper Input Validation

<0:3.12.1.1-3.el5
  • C
Resource Management Errors

<0:3.12.1.1-3.el5
  • C
Race Condition

<0:3.12.1.1-3.el5
  • C
Arbitrary Code Injection

<0:3.12.1.1-3.el5
  • C
Cross-site Scripting (XSS)

<0:3.12.2.0-2.el5
  • C
Improper Authentication

<0:3.12.1.1-3.el5
  • C
Resource Management Errors

<0:3.12.1.1-3.el5
  • C
Out-of-Bounds

<0:3.12.1.1-3.el5
  • C
Resource Management Errors

<0:3.12.1.1-3.el5
  • C
XML Injection

<0:3.12.1.1-3.el5
  • C
Cross-site Scripting (XSS)

<0:3.12.1.1-3.el5
  • C
Numeric Errors

<0:3.12.1.1-3.el5
  • C
Improper Input Validation

<0:3.12.1.1-3.el5
  • C
CVE-2008-4063

<0:3.12.1.1-1.el5
  • C
Directory Traversal

<0:3.12.1.1-1.el5
  • C
Cross-site Scripting (XSS)

<0:3.12.1.1-1.el5
  • C
CVE-2008-3837

<0:3.12.1.1-1.el5
  • C
Resource Management Errors

<0:3.12.1.1-1.el5
  • C
Access Restriction Bypass

<0:3.12.1.1-1.el5
  • C
Numeric Errors

<0:3.12.1.1-1.el5
  • C
Resource Management Errors

<0:3.12.1.1-1.el5
  • C
Directory Traversal

<0:3.12.1.1-1.el5
  • C
Access Restriction Bypass

<0:3.12.1.1-1.el5