firefox vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the firefox package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
ELSA-2011-1268

<0:3.6.22-1.0.1.el6_1
  • H
CVE-2020-16012

<0:78.5.0-1.0.1.el6_10
  • C
Use After Free

<0:78.4.1-1.0.1.el6_10
  • H
CVE-2020-26961

<0:78.5.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:78.5.0-1.0.1.el6_10
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:78.5.0-1.0.1.el6_10
  • H
Use After Free

<0:78.5.0-1.0.1.el6_10
  • H
Use After Free

<0:78.5.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:78.5.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:78.5.0-1.0.1.el6_10
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:78.5.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:78.5.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:78.3.0-1.0.1.el6_10
  • H
Use After Free

<0:78.3.0-1.0.1.el6_10
  • H
Open Redirect

<0:78.3.0-1.0.1.el6_10
  • H
Use After Free

<0:78.3.0-1.0.1.el6_10
  • H
Use After Free

<0:68.12.0-1.0.1.el6_10
  • H
Use After Free

<0:68.11.0-1.0.1.el6_10
  • H
Incorrect Authorization

<0:68.12.0-1.0.1.el6_10
  • H
Information Exposure

<0:68.11.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.11.0-1.0.1.el6_10
  • H
Use After Free

<0:68.10.0-1.0.1.el6_10
  • H
Origin Validation Error

<0:68.11.0-1.0.1.el6_10
  • H
Insufficient Verification of Data Authenticity

<0:68.9.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.9.0-1.0.1.el6_10
  • H
Out-of-bounds Read

<0:68.10.0-1.0.1.el6_10
  • H
Improper Certificate Validation

<0:68.10.0-1.0.1.el6_10
  • H
Race Condition

<0:68.10.0-1.0.1.el6_10
  • H
Race Condition

<0:68.9.0-1.0.1.el6_10
  • C
Directory Traversal

<0:68.8.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.8.0-1.0.1.el6_10
  • C
Race Condition

<0:68.8.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.8.0-1.0.1.el6_10
  • H
Use of Uninitialized Resource

<0:68.7.0-2.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.7.0-2.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.7.0-2.0.1.el6_10
  • C
Race Condition

<0:68.6.1-1.0.1.el6_10
  • C
Race Condition

<0:68.6.1-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:68.5.0-2.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.5.0-2.0.1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:68.4.1-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.6.0-1.0.1.el6_10
  • H
Information Exposure

<0:68.6.0-1.0.1.el6_10
  • H
Use After Free

<0:68.6.0-1.0.1.el6_10
  • H
Use After Free

<0:68.6.0-1.0.1.el6_10
  • H
Arbitrary Command Injection

<0:68.6.0-1.0.1.el6_10
  • H
Out-of-bounds Read

<0:68.6.0-1.0.1.el6_10
  • H
Out-of-bounds Read

<0:68.6.0-1.0.1.el6_10
  • C
Cross-site Scripting (XSS)

<0:68.4.1-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.5.0-2.0.1.el6_10
  • C
Cross-site Scripting (XSS)

<0:68.4.1-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.4.1-1.0.1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:68.4.1-1.0.1.el6_10
  • C
Race Condition

<0:68.3.0-1.0.1.el6_10
  • C
Race Condition

<0:68.3.0-1.0.1.el6_10
  • C
Use After Free

<0:68.3.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.3.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.3.0-1.0.1.el6_10
  • C
Race Condition

<0:68.2.0-4.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.2.0-4.0.1.el6_10
  • C
Cross-site Scripting (XSS)

<0:68.2.0-4.0.1.el6_10
  • C
Origin Validation Error

<0:68.2.0-4.0.1.el6_10
  • C
Out-of-bounds Write

<0:60.9.0-1.0.1.el6_10
  • C
Improper Authentication

<0:60.9.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.2.0-4.0.1.el6_10
  • C
Buffer Overflow

<0:68.2.0-4.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.2.0-4.0.1.el6_10
  • C
Use After Free

<0:68.2.0-4.0.1.el6_10
  • C
CVE-2019-9812

<0:60.9.0-1.0.1.el6_10
  • C
Use After Free

<0:60.9.0-1.0.1.el6_10
  • C
Inclusion of Functionality from Untrusted Control Sphere

<0:60.9.0-1.0.1.el6_10
  • C
Cross-site Scripting (XSS)

<0:60.9.0-1.0.1.el6_10
  • C
Use After Free

<0:60.9.0-1.0.1.el6_10
  • C
Information Exposure

<0:60.9.0-1.0.1.el6_10
  • C
Cross-site Request Forgery (CSRF)

<0:60.8.0-1.0.1.el6_10
  • C
CVE-2019-11711

<0:60.8.0-1.0.1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.7.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:60.8.0-1.0.1.el6_10
  • C
Cross-site Scripting (XSS)

<0:60.8.0-1.0.1.el6_10
  • C
Arbitrary Code Injection

<0:60.8.0-1.0.1.el6_10
  • C
Improper Encoding or Escaping of Output

<0:60.8.0-1.0.1.el6_10
  • C
Use After Free

<0:60.8.0-1.0.1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.7.2-1.0.1.el6_10
  • C
Improper Input Validation

<0:60.7.2-1.0.1.el6_10
  • C
CVE-2019-11730

<0:60.8.0-1.0.1.el6_10
  • C
Out-of-bounds Read

<0:60.7.0-1.0.1.el6_10
  • C
Origin Validation Error

<0:60.7.0-1.0.1.el6_10
  • C
Information Exposure

<0:60.7.0-1.0.1.el6_10
  • C
Use After Free

<0:60.7.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:60.7.0-1.0.1.el6_10
  • C
Use After Free

<0:60.7.0-1.0.1.el6_10
  • C
Use After Free

<0:60.7.0-1.0.1.el6_10
  • C
Origin Validation Error

<0:60.7.0-1.0.1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.7.0-1.0.1.el6_10
  • C
Use After Free

<0:60.7.0-1.0.1.el6_10
  • C
Improper Input Validation

<0:60.7.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:60.7.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:60.6.0-3.0.1.el6_10
  • C
Out-of-bounds Write

<0:60.6.0-3.0.1.el6_10
  • C
Improper Authentication

<0:60.5.0-2.0.1.el6
  • C
CVE-2018-18506

<0:60.6.0-3.0.1.el6_10
  • C
Out-of-Bounds

<0:60.6.1-1.0.1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.6.1-1.0.1.el6_10
  • C
Out-of-Bounds

<0:60.6.0-3.0.1.el6_10
  • C
Reachable Assertion

<0:60.6.0-3.0.1.el6_10
  • C
Use After Free

<0:60.6.0-3.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.5.1-1.0.1.el6_10
  • C
Use After Free

<0:60.6.0-3.0.1.el6_10
  • C
Use After Free

<0:60.5.0-2.0.1.el6
  • C
Out-of-Bounds

<0:60.5.0-2.0.1.el6
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.6.0-3.0.1.el6_10
  • H
Integer Overflow or Wraparound

<0:60.5.1-1.0.1.el6_10
  • C
Out-of-bounds Read

<0:60.4.0-1.0.1.el6
  • C
Out-of-Bounds

<0:60.4.0-1.0.1.el6
  • C
Integer Overflow or Wraparound

<0:60.4.0-1.0.1.el6
  • C
Origin Validation Error

<0:60.4.0-1.0.1.el6
  • C
Out-of-Bounds

<0:60.4.0-1.0.1.el6
  • C
Use After Free

<0:60.4.0-1.0.1.el6
  • C
Incorrect Permission Assignment for Critical Resource

<0:60.3.0-1.0.1.el6
  • C
CVE-2018-12395

<0:60.3.0-1.0.1.el6
  • C
CVE-2018-5168

<0:52.8.0-1.0.1.el6_9
  • H
Use After Free

<0:52.7.3-1.0.1.el6_9
  • C
CVE-2018-12392

<0:60.3.0-1.0.1.el6
  • C
Information Exposure

<0:60.3.0-1.0.1.el6
  • C
Use After Free

<0:60.3.0-1.0.1.el6
  • C
Out-of-Bounds

<0:60.3.0-1.0.1.el6
  • C
Integer Overflow or Wraparound

<0:60.3.0-1.0.1.el6
  • C
Out-of-Bounds

<0:60.3.0-1.0.1.el6
  • C
Improper Input Validation

<0:60.3.0-1.0.1.el6
  • C
Incorrect Type Conversion or Cast

<0:60.3.0-1.0.1.el6
  • C
Information Exposure

<0:60.3.0-1.0.1.el6
  • C
Out-of-Bounds

<0:60.3.0-1.0.1.el6
  • C
Out-of-bounds Write

<0:60.3.0-1.0.1.el6
  • C
Use After Free

<0:60.3.0-1.0.1.el6
  • C
Use After Free

<0:52.8.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.8.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.8.0-1.0.1.el6_9
  • C
Information Exposure

<0:52.8.0-1.0.1.el6_9
  • C
Use After Free

<0:52.8.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.8.0-1.0.1.el6_9
  • C
Integer Overflow or Wraparound

<0:52.8.0-1.0.1.el6_9
  • C
Arbitrary Code Injection

<0:52.8.0-1.0.1.el6_9
  • C
Information Exposure

<0:52.7.0-1.0.1.el6_9
  • C
Use After Free

<0:52.6.0-1.0.1.el6_9
  • C
Improper Input Validation

<0:52.7.0-1.0.1.el6_9
  • C
Integer Overflow or Wraparound

<0:52.7.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.7.0-1.0.1.el6_9
  • C
Out-of-bounds Write

<0:52.7.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.7.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.7.0-1.0.1.el6_9
  • C
Out-of-bounds Write

<0:52.7.2-1.0.1.el6_9
  • C
Use After Free

<0:52.6.0-1.0.1.el6_9
  • C
Use After Free

<0:52.6.0-1.0.1.el6_9
  • C
Use After Free

<0:52.6.0-1.0.1.el6_9
  • C
Use After Free

<0:52.6.0-1.0.1.el6_9
  • C
Use After Free

<0:52.6.0-1.0.1.el6_9
  • C
Use After Free

<0:52.6.0-1.0.1.el6_9
  • C
CVE-2018-5117

<0:52.6.0-1.0.1.el6_9
  • C
Use After Free

<0:52.6.0-1.0.1.el6_9
  • C
Integer Overflow or Wraparound

<0:52.6.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.6.0-1.0.1.el6_9
  • H
Information Exposure

<0:52.5.1-1.0.1.el6_9
  • C
Use After Free

<0:52.5.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.5.0-1.0.1.el6_9
  • C
CVE-2017-7830

<0:52.5.0-1.0.1.el6_9
  • C
Use After Free

<0:52.4.0-1.0.1.el6_9
  • C
Use After Free

<0:52.4.0-1.0.1.el6_9
  • C
Improper Input Validation

<0:52.4.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.4.0-1.0.1.el6_9
  • C
Cross-site Scripting (XSS)

<0:52.4.0-1.0.1.el6_9
  • C
Use After Free

<0:52.4.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.4.0-1.0.1.el6_9
  • C
Use After Free

<0:52.3.0-3.0.1.el6_9
  • C
Out-of-Bounds

<0:52.3.0-3.0.1.el6_9
  • C
Improper Input Validation

<0:52.3.0-3.0.1.el6_9
  • C
Out-of-bounds Read

<0:52.3.0-3.0.1.el6_9
  • C
Use After Free

<0:52.3.0-3.0.1.el6_9
  • C
Out-of-Bounds

<0:52.3.0-3.0.1.el6_9
  • C
Improper Privilege Management

<0:52.3.0-3.0.1.el6_9
  • C
Use After Free

<0:52.3.0-3.0.1.el6_9
  • C
Improper Input Validation

<0:52.3.0-3.0.1.el6_9
  • C
Use After Free

<0:52.3.0-3.0.1.el6_9
  • C
Use After Free

<0:52.3.0-3.0.1.el6_9
  • C
Information Exposure

<0:52.3.0-3.0.1.el6_9
  • C
Out-of-Bounds

<0:52.3.0-3.0.1.el6_9
  • C
Out-of-Bounds

<0:52.3.0-3.0.1.el6_9
  • C
Arbitrary Code Injection

<0:52.3.0-3.0.1.el6_9
  • C
Use After Free

<0:52.2.0-1.0.1.el6_9
  • C
CVE-2017-5437

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • C
Use After Free

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • C
Use After Free

<0:52.2.0-1.0.1.el6_9
  • C
Improper Input Validation

<0:52.2.0-1.0.1.el6_9
  • C
Use After Free

<0:52.2.0-1.0.1.el6_9
  • C
Use After Free

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • C
Use After Free

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • C
Use After Free

<0:52.2.0-1.0.1.el6_9
  • C
CVE-2017-7775

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-bounds Read

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-bounds Read

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-bounds Write

<0:52.1.0-2.0.1.el6_9
  • C
Improper Validation of Array Index

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-bounds Write

<0:52.1.0-2.0.1.el6_9
  • C
Out-of-bounds Write

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Improper Input Validation

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:52.1.0-2.0.1.el6_9
  • C
Use After Free

<0:45.8.0-2.0.1.el6_8
  • C
Out-of-Bounds

<0:45.8.0-2.0.1.el6_8
  • C
DEPRECATED: Use of Uninitialized Resource

<0:45.8.0-2.0.1.el6_8
  • C
Information Exposure

<0:45.8.0-2.0.1.el6_8
  • C
Error Handling

<0:45.8.0-2.0.1.el6_8
  • C
Information Exposure

<0:45.8.0-2.0.1.el6_8
  • C
Use After Free

<0:45.8.0-2.0.1.el6_8
  • C
Out-of-Bounds

<0:45.8.0-2.0.1.el6_8
  • C
CVE-2017-5386

<0:45.7.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.8.0-2.0.1.el6_8
  • C
Out-of-Bounds

<0:45.7.0-1.0.1.el6_8
  • C
Use After Free

<0:45.7.0-1.0.1.el6_8
  • C
Use After Free

<0:45.7.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.7.0-1.0.1.el6_8
  • C
Information Exposure

<0:45.7.0-1.0.1.el6_8
  • C
CVE-2017-5390

<0:45.7.0-1.0.1.el6_8
  • C
Use After Free

<0:45.7.0-1.0.1.el6_8
  • C
Improper Input Validation

<0:45.7.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.5.0-1.0.1.el6_8
  • C
Use After Free

<0:45.6.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.6.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.5.0-1.0.1.el6_8
  • C
Information Exposure

<0:45.6.0-1.0.1.el6_8
  • C
Integer Overflow or Wraparound

<0:45.4.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.4.0-1.0.1.el6_8
  • C
Security Features

<0:45.6.0-1.0.1.el6_8
  • C
Origin Validation Error

<0:45.6.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.6.0-1.0.1.el6_8
  • C
Improper Access Control

<0:45.6.0-1.0.1.el6_8
  • C
Use After Free

<0:45.5.1-1.0.1.el6_8
  • C
Use After Free

<0:45.6.0-1.0.1.el6_8
  • C
Security Features

<0:45.6.0-1.0.1.el6_8
  • C
Improper Input Validation

<0:45.6.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.5.0-1.0.1.el6_8
  • C
Improper Certificate Validation

<0:45.5.0-1.0.1.el6_8
  • C
Integer Overflow or Wraparound

<0:45.5.0-1.0.1.el6_8
  • C
Improper Input Validation

<0:45.5.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.2.0-1.0.1.el6_8
  • C
Security Features

<0:45.2.0-1.0.1.el6_8
  • C
Use After Free

<0:45.4.0-1.0.1.el6_8
  • C
Use After Free

<0:45.4.0-1.0.1.el6_8
  • C
Improper Input Validation

<0:45.4.0-1.0.1.el6_8
  • C
Use After Free

<0:45.4.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.4.0-1.0.1.el6_8
  • C
Improper Input Validation

<0:45.4.0-1.0.1.el6_8
  • C
Use After Free

<0:45.4.0-1.0.1.el6_8
  • C
Information Exposure

<0:45.4.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.4.0-1.0.1.el6_8
  • C
Use After Free

<0:45.4.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el6_8
  • C
Information Exposure

<0:45.3.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el6_8
  • C
Information Exposure

<0:45.3.0-1.0.1.el6_8
  • C
Use After Free

<0:45.3.0-1.0.1.el6_8
  • C
Use After Free

<0:45.3.0-1.0.1.el6_8
  • C
Use After Free

<0:45.3.0-1.0.1.el6_8
  • C
Use After Free

<0:45.3.0-1.0.1.el6_8
  • C
Incorrect Type Conversion or Cast

<0:45.3.0-1.0.1.el6_8
  • C
Cross-site Scripting (XSS)

<0:45.3.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.2.0-1.0.1.el6_8
  • C
CVE-2016-2828

<0:45.2.0-1.0.1.el6_8
  • C
CVE-2016-2821

<0:45.2.0-1.0.1.el6_8
  • C
Improper Access Control

<0:45.2.0-1.0.1.el6_8
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Security Features

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
CVE-2016-1960

<0:38.7.0-1.0.1.el6_7
  • C
Improper Data Handling

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.6.1-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.6.1-1.0.1.el6_7
  • C
Security Features

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
Improper Data Handling

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.6.0-1.0.1.el6_7
  • C
CVE-2016-1962

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.6.0-1.0.1.el6_7
  • C
CVE-2016-1973

<0:38.7.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • C
CVE-2016-1964

<0:38.7.0-1.0.1.el6_7
  • C
Access Restriction Bypass

<0:38.7.0-1.0.1.el6_7
  • C
CVE-2016-1961

<0:38.7.0-1.0.1.el6_7
  • C
CVE-2016-1523

<0:38.6.1-1.0.1.el6_7
  • C
CVE-2016-1966

<0:38.7.0-1.0.1.el6_7
  • C
Numeric Errors

<0:38.5.0-2.0.1.el6_7
  • C
Security Features

<0:38.4.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.5.0-2.0.1.el6_7
  • C
CVE-2015-7210

<0:38.5.0-2.0.1.el6_7
  • C
Numeric Errors

<0:38.5.0-2.0.1.el6_7
  • C
Numeric Errors

<0:38.5.0-2.0.1.el6_7
  • C
Information Exposure

<0:38.5.0-2.0.1.el6_7
  • C
Numeric Errors

<0:38.5.0-2.0.1.el6_7
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el6_7
  • C
Access Restriction Bypass

<0:38.4.0-1.0.1.el6_7
  • C
Security Features

<0:38.4.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el6_7
  • C
Code

<0:38.4.0-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el6_7
  • C
Race Condition

<0:38.3.0-2.0.1.el6_7
  • C
CVE-2015-4497

<0:38.2.1-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • C
Information Exposure

<0:38.2.0-4.0.1.el6_7
  • H
CVE-2015-4495

<0:38.1.1-1.0.1.el6_7
  • C
Out-of-Bounds

<0:38.3.0-2.0.1.el6_7
  • C
CVE-2015-4509

<0:38.3.0-2.0.1.el6_7
  • C
Security Features

<0:38.2.1-1.0.1.el6_7
  • C
CVE-2015-2728

<0:38.1.0-1.0.1.el6_6
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el6_6
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • C
Numeric Errors

<0:38.2.0-4.0.1.el6_7
  • C
Numeric Errors

<0:38.2.0-4.0.1.el6_7
  • C
CVE-2015-4492

<0:38.2.0-4.0.1.el6_7
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • C
Numeric Errors

<0:38.2.0-4.0.1.el6_7
  • C
CVE-2015-4488

<0:38.2.0-4.0.1.el6_7
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el6_6
  • C
Cryptographic Issues

<0:38.1.0-1.0.1.el6_6
  • C
Improper Input Validation

<0:38.1.0-1.0.1.el6_6
  • C
Code

<0:38.1.0-1.0.1.el6_6
  • C
CVE-2015-2722

<0:38.1.0-1.0.1.el6_6
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el6_6
  • C
Code

<0:38.1.0-1.0.1.el6_6
  • C
Code

<0:38.1.0-1.0.1.el6_6
  • C
Code

<0:38.1.0-1.0.1.el6_6
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el6_6
  • C
Code

<0:38.1.0-1.0.1.el6_6
  • C
CVE-2015-2731

<0:38.1.0-1.0.1.el6_6
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el6_6
  • C
Code

<0:38.1.0-1.0.1.el6_6
  • C
CVE-2015-2733

<0:38.1.0-1.0.1.el6_6
  • C
CVE-2015-2713

<0:38.0-4.0.1.el6_6
  • C
CVE-2015-2708

<0:38.0-4.0.1.el6_6
  • C
CVE-2015-0797

<0:38.0-4.0.1.el6_6
  • C
Out-of-Bounds

<0:38.0-4.0.1.el6_6
  • C
Out-of-Bounds

<0:38.0-4.0.1.el6_6
  • C
CVE-2015-0813

<0:31.6.0-2.0.1.el6_6
  • C
Code

<0:31.5.3-1.0.1.el6_6
  • C
CVE-2015-0815

<0:31.6.0-2.0.1.el6_6
  • C
Access Restriction Bypass

<0:31.5.3-1.0.1.el6_6
  • C
Cross-site Request Forgery (CSRF)

<0:31.6.0-2.0.1.el6_6
  • C
Access Restriction Bypass

<0:31.6.0-2.0.1.el6_6
  • C
Access Restriction Bypass

<0:31.6.0-2.0.1.el6_6
  • C
Out-of-Bounds

<0:31.5.0-1.0.1.el6_6
  • C
CVE-2015-0831

<0:31.5.0-1.0.1.el6_6
  • C
CVE-2015-0836

<0:31.5.0-1.0.1.el6_6
  • C
Information Exposure

<0:31.5.0-1.0.1.el6_6
  • C
CVE-2014-8634

<0:31.4.0-1.0.1.el6_6
  • C
CVE-2014-8641

<0:31.4.0-1.0.1.el6_6
  • C
CVE-2014-8639

<0:31.4.0-1.0.1.el6_6
  • C
Cross-site Request Forgery (CSRF)

<0:31.4.0-1.0.1.el6_6
  • C
Improper Input Validation

<0:31.3.0-3.0.1.el6_6
  • C
Improper Input Validation

<0:31.3.0-3.0.1.el6_6
  • C
Improper Input Validation

<0:31.3.0-3.0.1.el6_6
  • C
Out-of-Bounds

<0:31.3.0-3.0.1.el6_6
  • C
CVE-2014-1592

<0:31.3.0-3.0.1.el6_6
  • C
CVE-2014-1574

<0:31.2.0-3.0.1.el6_6
  • C
CVE-2014-1583

<0:31.2.0-3.0.1.el6_6
  • C
Out-of-Bounds

<0:31.2.0-3.0.1.el6_6
  • C
CVE-2014-1577

<0:31.2.0-3.0.1.el6_6
  • C
Out-of-Bounds

<0:31.2.0-3.0.1.el6_6
  • C
CVE-2014-1581

<0:31.2.0-3.0.1.el6_6
  • C
CVE-2014-1567

<0:24.8.0-1.0.1.el6_5
  • C
Out-of-Bounds

<0:24.8.0-1.0.1.el6_5
  • C
CVE-2014-1518

<0:24.5.0-1.0.1.el6_5
  • C
Out-of-bounds Write

<0:24.5.0-1.0.1.el6_5
  • C
Arbitrary Code Injection

<0:24.7.0-1.0.1.el6_5
  • C
CVE-2014-1547

<0:24.7.0-1.0.1.el6_5
  • C
Arbitrary Code Injection

<0:24.7.0-1.0.1.el6_5
  • C
CVE-2014-1555

<0:24.7.0-1.0.1.el6_5
  • C
CVE-2014-1538

<0:24.6.0-1.0.1.el6_5
  • C
CVE-2014-1541

<0:24.6.0-1.0.1.el6_5
  • C
CVE-2014-1533

<0:24.6.0-1.0.1.el6_5
  • C
Cross-site Scripting (XSS)

<0:24.5.0-1.0.1.el6_5
  • C
Buffer Overflow

<0:24.5.0-1.0.1.el6_5
  • C
Use After Free

<0:24.5.0-1.0.1.el6_5
  • C
Improper Privilege Management

<0:24.5.0-1.0.1.el6_5
  • C
Use After Free

<0:24.5.0-1.0.1.el6_5
  • C
Out-of-bounds Read

<0:24.4.0-1.0.1.el6_5
  • C
Information Exposure

<0:24.4.0-1.0.1.el6_5
  • C
Improper Privilege Management

<0:24.4.0-1.0.1.el6_5
  • C
Improper Privilege Management

<0:24.4.0-1.0.1.el6_5
  • C
Out-of-Bounds

<0:24.4.0-1.0.1.el6_5
  • C
Out-of-bounds Read

<0:24.4.0-1.0.1.el6_5
  • C
Buffer Overflow

<0:24.4.0-1.0.1.el6_5
  • C
Use After Free

<0:24.4.0-1.0.1.el6_5
  • C
Out-of-bounds Write

<0:24.4.0-1.0.1.el6_5
  • C
Out-of-bounds Write

<0:24.4.0-1.0.1.el6_5
  • C
Out-of-bounds Write

<0:24.3.0-2.0.1.el6_5
  • C
CVE-2014-1481

<0:24.3.0-2.0.1.el6_5
  • C
Use After Free

<0:24.3.0-2.0.1.el6_5
  • C
CVE-2014-1477

<0:24.3.0-2.0.1.el6_5
  • C
CVE-2014-1479

<0:24.3.0-2.0.1.el6_5
  • C
Origin Validation Error

<0:24.3.0-2.0.1.el6_5
  • C
Cross-site Scripting (XSS)

<0:24.2.0-1.0.1.el6_5
  • C
Arbitrary Code Injection

<0:24.2.0-1.0.1.el6_5
  • C
Use After Free

<0:24.2.0-1.0.1.el6_5
  • C
Use After Free

<0:24.2.0-1.0.1.el6_5
  • C
Improper Restriction of Rendered UI Layers or Frames

<0:24.2.0-1.0.1.el6_5
  • C
Use After Free

<0:24.2.0-1.0.1.el6_5
  • C
CVE-2013-5609

<0:24.2.0-1.0.1.el6_5
  • C
CVE-2013-5597

<0:17.0.10-1.0.1.el6_4
  • C
CVE-2013-5590

<0:17.0.10-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el6_4
  • C
CVE-2013-5599

<0:17.0.10-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el6_4
  • C
CVE-2013-5601

<0:17.0.10-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el6_4
  • C
CVE-2013-5600

<0:17.0.10-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • C
Improper Input Validation

<0:17.0.9-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.9-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.9-1.0.1.el6_4
  • C
CVE-2013-1701

<0:17.0.8-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.8-1.0.1.el6_4
  • C
Cross-site Scripting (XSS)

<0:17.0.8-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.8-1.0.1.el6_4
  • C
Improper Input Validation

<0:17.0.8-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.8-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • C
CVE-2013-1682

<0:17.0.7-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el6_4
  • C
Improper Input Validation

<0:17.0.7-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.7-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.6-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.6-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el6_4
  • C
Cross-site Scripting (XSS)

<0:17.0.6-1.0.1.el6_4
  • C
Out-of-Bounds

<0:17.0.6-1.0.1.el6_4
  • C
Improper Initialization

<0:17.0.6-1.0.1.el6_4
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el6_4
  • C
CVE-2013-0801

<0:17.0.6-1.0.1.el6_4
  • C
CVE-2013-0796

<0:17.0.5-1.0.1.el6_4
  • C
Access Restriction Bypass

<0:17.0.5-1.0.1.el6_4
  • C
CVE-2013-0800

<0:17.0.5-1.0.1.el6_4
  • C
CVE-2013-0788

<0:17.0.5-1.0.1.el6_4
  • C
Cross-site Scripting (XSS)

<0:17.0.5-1.0.1.el6_4
  • C
Out-of-bounds Write

<0:17.0.3-1.0.1.el6_3
  • C
CVE-2013-0783

<0:17.0.3-1.0.1.el6_3
  • C
Use After Free

<0:17.0.3-1.0.1.el6_3
  • C
Use After Free

<0:17.0.3-1.0.1.el6_3
  • C
Improper Certificate Validation

<0:17.0.3-1.0.1.el6_3
  • C
CVE-2013-0746

<0:10.0.12-1.0.1.el6_3
  • C
Information Exposure

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
Arbitrary Code Injection

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
CVE-2013-0769

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.2.el6_3
  • C
Integer Overflow or Wraparound

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.2.el6_3
  • C
Improper Authentication

<0:10.0.12-1.0.1.el6_3
  • C
Out-of-bounds Read

<0:10.0.12-1.0.1.el6_3
  • C
Use After Free

<0:10.0.12-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Integer Overflow or Wraparound

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
CVE-2012-5842

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el6_3
  • C
Arbitrary Code Injection

<0:10.0.10-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.2.el6_3
  • C
Out-of-bounds Read

<0:10.0.8-1.0.2.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.2.el6_3
  • C
Improper Privilege Management

<0:10.0.8-1.0.2.el6_3
  • C
CVE-2012-3982

<0:10.0.8-1.0.2.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.2.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el6_3
  • C
Use After Free

<0:10.0.8-1.0.2.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el6_3
  • C
Improper Input Validation

<0:10.0.8-1.0.2.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.2.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el6_3
  • C
Use After Free

<0:10.0.8-1.0.2.el6_3
  • C
Use After Free

<0:10.0.8-1.0.2.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.2.el6_3
  • C
Access Restriction Bypass

<0:10.0.8-1.0.2.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el6_3
  • C
CVE-2012-3962

<0:10.0.7-1.0.1.el6_3
  • C
Numeric Errors

<0:10.0.7-1.0.1.el6_3
  • C
Arbitrary Code Injection

<0:10.0.7-1.0.1.el6_3
  • C
Information Exposure

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Information Exposure

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1955

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1967

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1964

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1948

<0:10.0.6-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el6_3
  • C
Improper Input Validation

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.6-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1950

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2011-3101

<0:10.0.5-1.0.1.el6_2
  • C
CVE-2012-1938

<0:10.0.5-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.5-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.5-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.5-1.0.1.el6_2
  • C
Information Exposure

<0:10.0.5-1.0.1.el6_2
  • C
CVE-2012-1937

<0:10.0.5-1.0.1.el6_2
  • C
CVE-2012-0479

<0:10.0.4-1.0.1.el6_2
  • C
Incorrect Calculation

<0:10.0.4-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.4-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el6_2
  • C
Numeric Errors

<0:10.0.4-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el6_2
  • C
CVE-2012-0467

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.3-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el6_2
  • C
Information Exposure

<0:10.0.3-1.0.1.el6_2
  • C
Arbitrary Code Injection

<0:10.0.3-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el6_2
  • C
CVE-2012-0461

<0:10.0.3-1.0.1.el6_2
  • C
CVE-2012-0462

<0:10.0.3-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el6_2
  • C
Out-of-Bounds

<0:3.6.26-1.0.1.el6_2
  • C
CVE-2012-0442

<0:3.6.26-1.0.1.el6_2
  • C
Use After Free

<0:3.6.26-1.0.1.el6_2
  • C
Information Exposure

<0:3.6.26-1.0.1.el6_2
  • C
Out-of-Bounds

<0:3.6.26-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:3.6.24-3.0.1.el6_1
  • C
Out-of-Bounds

<0:3.6.24-3.0.1.el6_1
  • C
Improper Input Validation

<0:3.6.24-3.0.1.el6_1
  • C
Arbitrary Code Injection

<0:3.6.20-2.0.1.el6_1
  • C
Access Restriction Bypass

<0:3.6.23-2.0.1.el6_1
  • C
Numeric Errors

<0:3.6.23-2.0.1.el6_1
  • C
Arbitrary Code Injection

<0:3.6.23-2.0.1.el6_1
  • C
Access Restriction Bypass

<0:3.6.23-2.0.1.el6_1
  • C
Information Exposure

<0:3.6.20-2.0.1.el6_1
  • C
CVE-2011-2995

<0:3.6.23-2.0.1.el6_1
  • C
Configuration

<0:3.6.20-2.0.1.el6_1
  • C
CVE-2011-2982

<0:3.6.20-2.0.1.el6_1
  • C
Arbitrary Code Injection

<0:3.6.20-2.0.1.el6_1
  • C
Arbitrary Code Injection

<0:3.6.20-2.0.1.el6_1
  • C
Arbitrary Code Injection

<0:3.6.18-1.0.1.el6_1
  • C
CVE-2011-0074

<0:3.6.17-1.0.1.el6_0
  • C
Resource Management Errors

<0:3.6.18-1.0.1.el6_1
  • C
Resource Management Errors

<0:3.6.18-1.0.1.el6_1
  • C
Resource Management Errors

<0:3.6.18-1.0.1.el6_1
  • C
CVE-2011-2375

<0:3.6.18-1.0.1.el6_1
  • C
Resource Management Errors

<0:3.6.18-1.0.1.el6_1
  • C
Numeric Errors

<0:3.6.18-1.0.1.el6_1
  • C
Access Restriction Bypass

<0:3.6.18-1.0.1.el6_1
  • C
Out-of-Bounds

<0:3.6.18-1.0.1.el6_1
  • C
CVE-2011-2376

<0:3.6.18-1.0.1.el6_1
  • C
CVE-2011-2374

<0:3.6.18-1.0.1.el6_1
  • C
CVE-2011-2364

<0:3.6.18-1.0.1.el6_1
  • C
CVE-2011-2365

<0:3.6.18-1.0.1.el6_1
  • C
Resource Management Errors

<0:3.6.17-1.0.1.el6_0
  • C
CVE-2011-0080

<0:3.6.17-1.0.1.el6_0
  • C
CVE-2011-0075

<0:3.6.17-1.0.1.el6_0
  • C
Directory Traversal

<0:3.6.17-1.0.1.el6_0
  • C
Improper Input Validation

<0:3.6.17-1.0.1.el6_0
  • C
Improper Input Validation

<0:3.6.14-4.0.1.el6_0
  • C
CVE-2011-0070

<0:3.6.17-1.0.1.el6_0
  • C
Improper Input Validation

<0:3.6.17-1.0.1.el6_0
  • C
Improper Input Validation

<0:3.6.14-4.0.1.el6_0
  • C
CVE-2011-0069

<0:3.6.17-1.0.1.el6_0
  • C
CVE-2011-0081

<0:3.6.17-1.0.1.el6_0
  • C
CVE-2011-0072

<0:3.6.17-1.0.1.el6_0
  • C
CVE-2011-0078

<0:3.6.17-1.0.1.el6_0
  • C
CVE-2011-0077

<0:3.6.17-1.0.1.el6_0
  • C
Resource Management Errors

<0:3.6.17-1.0.1.el6_0
  • C
Information Exposure

<0:3.6.17-1.0.1.el6_0
  • C
Cross-site Request Forgery (CSRF)

<0:3.6.14-4.0.1.el6_0
  • C
Resource Management Errors

<0:3.6.14-4.0.1.el6_0
  • C
Out-of-Bounds

<0:3.6.14-4.0.1.el6_0
  • C
Out-of-Bounds

<0:3.6.14-4.0.1.el6_0
  • C
CVE-2011-0062

<0:3.6.14-4.0.1.el6_0
  • C
Out-of-Bounds

<0:3.6.14-4.0.1.el6_0
  • C
Resource Management Errors

<0:3.6.14-4.0.1.el6_0
  • C
Out-of-Bounds

<0:3.6.14-4.0.1.el6_0
  • C
CVE-2011-0053

<0:3.6.14-4.0.1.el6_0
  • C
CVE-2010-3771

<0:3.6.13-2.0.1.el6_0
  • C
Numeric Errors

<0:3.6.13-2.0.1.el6_0
  • C
CVE-2010-3773

<0:3.6.13-2.0.1.el6_0
  • C
Out-of-Bounds

<0:3.6.13-2.0.1.el6_0
  • C
Improper Input Validation

<0:3.6.13-2.0.1.el6_0
  • C
Cross-site Scripting (XSS)

<0:3.6.13-2.0.1.el6_0
  • C
Numeric Errors

<0:3.6.13-2.0.1.el6_0
  • C
Resource Management Errors

<0:3.6.13-2.0.1.el6_0
  • C
CVE-2010-3775

<0:3.6.13-2.0.1.el6_0
  • C
Out-of-Bounds

<0:3.6.13-2.0.1.el6_0
  • C
Improper Input Validation

<0:3.6.13-2.0.1.el6_0