thunderbird vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the thunderbird package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
ELSA-2011-1243

<0:3.1.12-2.0.1.el6_1
  • H
ELSA-2011-1267

<0:3.1.14-1.0.2.el6_1
  • H
ELSA-2011-0374

<0:3.1.9-3.0.1.el6_0
  • H
CVE-2020-16012

<0:78.5.0-1.0.1.el6_10
  • H
Use After Free

<0:78.4.3-1.0.1.el6_10
  • H
CVE-2020-26961

<0:78.5.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:78.5.0-1.0.1.el6_10
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:78.5.0-1.0.1.el6_10
  • H
Use After Free

<0:78.5.0-1.0.1.el6_10
  • H
Use After Free

<0:78.5.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:78.5.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:78.5.0-1.0.1.el6_10
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:78.5.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:78.5.0-1.0.1.el6_10
  • H
Use After Free

<0:78.4.0-1.0.1.el6_10
  • H
Use After Free

<0:78.4.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:78.3.1-1.0.1.el6_10
  • H
Use After Free

<0:78.3.1-1.0.1.el6_10
  • H
Open Redirect

<0:78.3.1-1.0.1.el6_10
  • H
Use After Free

<0:78.3.1-1.0.1.el6_10
  • H
Use After Free

<0:68.12.0-1.0.1.el6_10
  • H
Use After Free

<0:68.11.0-1.0.1.el6_10
  • H
Incorrect Authorization

<0:68.12.0-1.0.1.el6_10
  • H
Information Exposure

<0:68.11.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.11.0-1.0.1.el6_10
  • H
Use After Free

<0:68.10.0-1.0.1.el6_10
  • H
Origin Validation Error

<0:68.11.0-1.0.1.el6_10
  • H
Insufficient Verification of Data Authenticity

<0:68.9.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.9.0-1.0.1.el6_10
  • C
Origin Validation Error

<0:68.8.0-1.0.1.el6_10
  • H
Out-of-bounds Read

<0:68.10.0-1.0.1.el6_10
  • H
Improper Certificate Validation

<0:68.10.0-1.0.1.el6_10
  • H
Race Condition

<0:68.10.0-1.0.1.el6_10
  • H
Race Condition

<0:68.9.0-1.0.1.el6_10
  • H
Cleartext Transmission of Sensitive Information

<0:68.9.0-1.0.1.el6_10
  • C
Directory Traversal

<0:68.8.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.8.0-1.0.1.el6_10
  • C
Race Condition

<0:68.8.0-1.0.1.el6_10
  • C
Out-of-bounds Write

<0:68.8.0-1.0.1.el6_10
  • H
Use of Uninitialized Resource

<0:68.7.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.7.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.7.0-1.0.1.el6_10
  • H
Race Condition

<0:68.7.0-1.0.1.el6_10
  • H
Race Condition

<0:68.7.0-1.0.1.el6_10
  • H
NULL Pointer Dereference

<0:68.5.0-1.0.1.el6_10
  • H
Cleartext Storage of Sensitive Information

<0:68.5.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:68.5.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.5.0-1.0.1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:68.4.1-2.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.6.0-1.0.1.el6_10
  • H
Information Exposure

<0:68.6.0-1.0.1.el6_10
  • H
Use After Free

<0:68.6.0-1.0.1.el6_10
  • H
Use After Free

<0:68.6.0-1.0.1.el6_10
  • H
Arbitrary Command Injection

<0:68.6.0-1.0.1.el6_10
  • H
Out-of-bounds Read

<0:68.6.0-1.0.1.el6_10
  • H
Out-of-bounds Read

<0:68.6.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:68.4.1-2.0.1.el6_10
  • H
Use of Uninitialized Resource

<0:68.5.0-1.0.1.el6_10
  • H
Use of Uninitialized Resource

<0:68.5.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:68.4.1-2.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.4.1-2.0.1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:68.4.1-2.0.1.el6_10
  • H
Race Condition

<0:68.3.0-3.0.1.el6_10
  • H
Race Condition

<0:68.3.0-3.0.1.el6_10
  • H
Use After Free

<0:68.3.0-3.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.3.0-3.0.1.el6_10
  • H
Out-of-bounds Write

<0:68.3.0-3.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.9.0-1.0.1.el6_10
  • H
Use After Free

<0:60.9.0-1.0.1.el6_10
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:60.9.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:60.9.0-1.0.1.el6_10
  • H
Cleartext Transmission of Sensitive Information

<0:60.9.0-1.0.1.el6_10
  • H
Use After Free

<0:60.9.0-1.0.1.el6_10
  • H
Information Exposure

<0:60.9.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.7.2-2.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.7.2-2.0.1.el6_10
  • H
Cross-site Request Forgery (CSRF)

<0:60.8.0-1.0.1.el6_10
  • H
CVE-2019-11711

<0:60.8.0-1.0.1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.7.2-2.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.8.0-1.0.1.el6_10
  • H
Cross-site Scripting (XSS)

<0:60.8.0-1.0.1.el6_10
  • H
Arbitrary Code Injection

<0:60.8.0-1.0.1.el6_10
  • H
Improper Encoding or Escaping of Output

<0:60.8.0-1.0.1.el6_10
  • H
Use After Free

<0:60.8.0-1.0.1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.7.2-2.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.7.2-2.0.1.el6_10
  • H
Improper Input Validation

<0:60.7.2-2.0.1.el6_10
  • H
CVE-2019-11730

<0:60.8.0-1.0.1.el6_10
  • H
Out-of-bounds Read

<0:60.7.0-1.0.1.el6_10
  • H
Origin Validation Error

<0:60.7.0-1.0.1.el6_10
  • H
Information Exposure

<0:60.7.0-1.0.1.el6_10
  • H
Use After Free

<0:60.7.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.7.0-1.0.1.el6_10
  • H
Use After Free

<0:60.7.0-1.0.1.el6_10
  • H
Use After Free

<0:60.7.0-1.0.1.el6_10
  • H
Origin Validation Error

<0:60.7.0-1.0.1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.7.0-1.0.1.el6_10
  • H
Use After Free

<0:60.7.0-1.0.1.el6_10
  • H
Improper Input Validation

<0:60.7.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.7.0-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.6.1-1.0.1.el6_10
  • H
Out-of-bounds Write

<0:60.6.1-1.0.1.el6_10
  • H
Improper Authentication

<0:60.5.0-1.0.1.el6_10
  • H
CVE-2018-18506

<0:60.6.1-1.0.1.el6_10
  • H
Out-of-Bounds

<0:60.6.1-1.0.1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.6.1-1.0.1.el6_10
  • H
Out-of-Bounds

<0:60.6.1-1.0.1.el6_10
  • H
Reachable Assertion

<0:60.6.1-1.0.1.el6_10
  • H
Use After Free

<0:60.6.1-1.0.1.el6_10
  • H
Use After Free

<0:60.6.1-1.0.1.el6_10
  • H
Use After Free

<0:60.5.0-1.0.1.el6_10
  • H
Use After Free

<0:60.5.0-1.0.1.el6_10
  • H
Out-of-Bounds

<0:60.5.0-1.0.1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.6.1-1.0.1.el6_10
  • H
Out-of-bounds Read

<0:60.4.0-1.0.1.el6
  • H
Out-of-Bounds

<0:60.4.0-1.0.1.el6
  • H
Integer Overflow or Wraparound

<0:60.4.0-1.0.1.el6
  • H
Origin Validation Error

<0:60.4.0-1.0.1.el6
  • H
Out-of-Bounds

<0:60.4.0-1.0.1.el6
  • H
Use After Free

<0:60.4.0-1.0.1.el6
  • H
Improper Input Validation

<0:60.2.1-5.0.1.el6
  • H
Insufficiently Protected Credentials

<0:60.2.1-5.0.1.el6
  • H
Information Exposure

<0:52.9.1-1.0.1.el6
  • H
CVE-2018-5168

<0:52.8.0-2.0.1.el6_9
  • H
Information Exposure

<0:52.9.1-1.0.1.el6
  • H
Information Exposure

<0:52.9.1-1.0.1.el6
  • H
Information Exposure

<0:52.9.1-1.0.1.el6
  • H
CVE-2018-12392

<0:60.3.0-1.0.1.el6
  • H
Use After Free

<0:60.2.1-5.0.1.el6
  • H
Out-of-Bounds

<0:60.3.0-1.0.1.el6
  • H
Integer Overflow or Wraparound

<0:60.3.0-1.0.1.el6
  • H
Out-of-Bounds

<0:60.3.0-1.0.1.el6
  • H
Information Exposure

<0:60.2.1-5.0.1.el6
  • H
Out-of-Bounds

<0:60.2.1-5.0.1.el6
  • H
Out-of-bounds Write

<0:60.2.1-5.0.1.el6
  • H
Use After Free

<0:60.2.1-5.0.1.el6
  • H
Use After Free

<0:52.8.0-2.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.9.1-1.0.1.el6
  • H
Integer Overflow or Wraparound

<0:52.9.1-1.0.1.el6
  • H
Use After Free

<0:52.9.1-1.0.1.el6
  • H
Out-of-Bounds

<0:52.9.1-1.0.1.el6
  • H
Cross-site Request Forgery (CSRF)

<0:52.9.1-1.0.1.el6
  • H
Use After Free

<0:52.9.1-1.0.1.el6
  • H
Out-of-Bounds

<0:52.9.1-1.0.1.el6
  • H
Improper Input Validation

<0:52.8.0-2.0.1.el6_9
  • H
Missing Encryption of Sensitive Data

<0:52.8.0-2.0.1.el6_9
  • H
Inadequate Encryption Strength

<0:52.8.0-2.0.1.el6_9
  • H
Improper Input Validation

<0:52.8.0-2.0.1.el6_9
  • H
Missing Encryption of Sensitive Data

<0:52.8.0-2.0.1.el6_9
  • H
Out-of-Bounds

<0:52.8.0-2.0.1.el6_9
  • H
Out-of-Bounds

<0:52.8.0-2.0.1.el6_9
  • H
Use After Free

<0:52.8.0-2.0.1.el6_9
  • H
Out-of-Bounds

<0:52.8.0-2.0.1.el6_9
  • H
Integer Overflow or Wraparound

<0:52.8.0-2.0.1.el6_9
  • H
Use After Free

<0:52.6.0-1.0.1.el6_9
  • H
Integer Overflow or Wraparound

<0:52.7.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.7.0-1.0.1.el6_9
  • H
Out-of-bounds Write

<0:52.7.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.7.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.7.0-1.0.1.el6_9
  • H
Out-of-bounds Write

<0:52.7.0-1.0.1.el6_9
  • H
Use After Free

<0:52.6.0-1.0.1.el6_9
  • H
Use After Free

<0:52.6.0-1.0.1.el6_9
  • H
Use After Free

<0:52.6.0-1.0.1.el6_9
  • H
Use After Free

<0:52.6.0-1.0.1.el6_9
  • H
Use After Free

<0:52.6.0-1.0.1.el6_9
  • H
CVE-2018-5117

<0:52.6.0-1.0.1.el6_9
  • H
Use After Free

<0:52.6.0-1.0.1.el6_9
  • H
Integer Overflow or Wraparound

<0:52.6.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.6.0-1.0.1.el6_9
  • H
Arbitrary Code Injection

<0:52.5.2-1.0.1.el6_9
  • H
Improper Input Validation

<0:52.5.2-1.0.1.el6_9
  • H
Information Exposure

<0:52.5.2-1.0.1.el6_9
  • H
Arbitrary Code Injection

<0:52.5.2-1.0.1.el6_9
  • H
Use After Free

<0:52.5.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.5.0-1.0.1.el6_9
  • H
CVE-2017-7830

<0:52.5.0-1.0.1.el6_9
  • H
Use After Free

<0:52.4.0-2.0.1.el6_9
  • H
Use After Free

<0:52.4.0-2.0.1.el6_9
  • H
Improper Input Validation

<0:52.4.0-2.0.1.el6_9
  • H
Out-of-Bounds

<0:52.4.0-2.0.1.el6_9
  • H
Cross-site Scripting (XSS)

<0:52.4.0-2.0.1.el6_9
  • H
Use After Free

<0:52.4.0-2.0.1.el6_9
  • H
Out-of-Bounds

<0:52.4.0-2.0.1.el6_9
  • H
Use After Free

<0:52.3.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.3.0-1.0.1.el6_9
  • H
Improper Input Validation

<0:52.3.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.3.0-1.0.1.el6_9
  • H
Use After Free

<0:52.3.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.3.0-1.0.1.el6_9
  • H
Improper Privilege Management

<0:52.3.0-1.0.1.el6_9
  • H
Use After Free

<0:52.3.0-1.0.1.el6_9
  • H
Improper Input Validation

<0:52.3.0-1.0.1.el6_9
  • H
Use After Free

<0:52.3.0-1.0.1.el6_9
  • H
Use After Free

<0:52.3.0-1.0.1.el6_9
  • H
Information Exposure

<0:52.3.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.3.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.3.0-1.0.1.el6_9
  • H
Use After Free

<0:52.2.0-1.0.1.el6_9
  • H
Improper Input Validation

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • H
Use After Free

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • H
Use After Free

<0:52.2.0-1.0.1.el6_9
  • H
Improper Input Validation

<0:52.2.0-1.0.1.el6_9
  • H
Use After Free

<0:52.2.0-1.0.1.el6_9
  • H
Use After Free

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • H
Use After Free

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-bounds Write

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.2.0-1.0.1.el6_9
  • H
CVE-2017-7775

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.2.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.1.0-1.0.1.el6_9
  • H
Cross-site Scripting (XSS)

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-bounds Read

<0:52.1.0-1.0.1.el6_9
  • H
Information Exposure

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-Bounds

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-bounds Write

<0:52.1.0-1.0.1.el6_9
  • H
Improper Validation of Array Index

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Out-of-bounds Write

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Improper Input Validation

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:52.1.0-1.0.1.el6_9
  • H
Use After Free

<0:45.8.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.8.0-1.0.1.el6_8
  • H
DEPRECATED: Use of Uninitialized Resource

<0:45.8.0-1.0.1.el6_8
  • H
Information Exposure

<0:45.8.0-1.0.1.el6_8
  • H
Error Handling

<0:45.8.0-1.0.1.el6_8
  • H
Information Exposure

<0:45.8.0-1.0.1.el6_8
  • H
Use After Free

<0:45.8.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.8.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.8.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.7.0-1.0.1.el6_8
  • H
Use After Free

<0:45.7.0-1.0.1.el6_8
  • H
Use After Free

<0:45.7.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.7.0-1.0.1.el6_8
  • H
Information Exposure

<0:45.7.0-1.0.1.el6_8
  • H
CVE-2017-5390

<0:45.7.0-1.0.1.el6_8
  • H
Use After Free

<0:45.7.0-1.0.1.el6_8
  • H
Improper Input Validation

<0:45.7.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.5.0-1.0.1.el6_8
  • H
Security Features

<0:45.6.0-1.0.1.el6_8
  • H
Origin Validation Error

<0:45.6.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.6.0-1.0.1.el6_8
  • H
Improper Access Control

<0:45.6.0-1.0.1.el6_8
  • H
Use After Free

<0:45.5.1-1.0.1.el6_8
  • H
Use After Free

<0:45.6.0-1.0.1.el6_8
  • H
Security Features

<0:45.6.0-1.0.1.el6_8
  • H
Improper Input Validation

<0:45.6.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.4.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.3.0-1.0.1.el6_8
  • H
Out-of-Bounds

<0:45.2-1.0.1.el6_8
  • H
Out-of-Bounds

<0:38.8.0-2.0.1.el6_8
  • H
Out-of-Bounds

<0:38.8.0-2.0.1.el6_8
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
CVE-2016-1960

<0:38.7.0-1.0.1.el6_7
  • H
Improper Data Handling

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
Improper Data Handling

<0:38.7.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.6.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.6.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.7.0-1.0.1.el6_7
  • H
CVE-2016-1964

<0:38.7.0-1.0.1.el6_7
  • H
Access Restriction Bypass

<0:38.7.0-1.0.1.el6_7
  • H
CVE-2016-1961

<0:38.7.0-1.0.1.el6_7
  • H
CVE-2016-1966

<0:38.7.0-1.0.1.el6_7
  • H
Numeric Errors

<0:38.5.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.5.0-1.0.1.el6_7
  • H
Numeric Errors

<0:38.5.0-1.0.1.el6_7
  • H
Information Exposure

<0:38.5.0-1.0.1.el6_7
  • H
Numeric Errors

<0:38.5.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.3.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.3.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.4.0-1.0.1.el6_7
  • H
Code

<0:38.4.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.4.0-1.0.1.el6_7
  • H
Access Restriction Bypass

<0:38.4.0-1.0.1.el6_7
  • H
Security Features

<0:38.4.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.4.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.4.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.3.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.3.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.3.0-1.0.1.el6_7
  • H
Security Features

<0:38.3.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.3.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.3.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.3.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:38.3.0-1.0.1.el6_7
  • H
Information Exposure

<0:38.3.0-1.0.1.el6_7
  • H
CVE-2015-4509

<0:38.3.0-1.0.1.el6_7
  • H
Out-of-Bounds

<0:31.8.0-1.0.1.el6_6
  • H
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • H
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • H
Out-of-Bounds

<0:38.2.0-4.0.1.el6_7
  • H
Numeric Errors

<0:38.2.0-4.0.1.el6_7
  • H
CVE-2015-4488

<0:38.2.0-4.0.1.el6_7
  • H
Out-of-Bounds

<0:31.8.0-1.0.1.el6_6
  • H
Cryptographic Issues

<0:31.8.0-1.0.1.el6_6
  • H
Code

<0:31.8.0-1.0.1.el6_6
  • H
Code

<0:31.8.0-1.0.1.el6_6
  • H
Code

<0:31.8.0-1.0.1.el6_6
  • H
Out-of-Bounds

<0:31.8.0-1.0.1.el6_6
  • H
Code

<0:31.8.0-1.0.1.el6_6
  • H
CVE-2015-2731

<0:31.8.0-1.0.1.el6_6
  • H
Out-of-Bounds

<0:31.8.0-1.0.1.el6_6
  • H
Code

<0:31.8.0-1.0.1.el6_6
  • H
CVE-2015-2713

<0:31.7.0-1.0.1.el6_6
  • H
CVE-2015-2708

<0:31.7.0-1.0.1.el6_6
  • H
Out-of-Bounds

<0:31.7.0-1.0.1.el6_6
  • H
Out-of-Bounds

<0:31.7.0-1.0.1.el6_6
  • H
CVE-2015-0813

<0:31.6.0-1.0.1.el6_6
  • H
CVE-2015-0815

<0:31.6.0-1.0.1.el6_6
  • H
Cross-site Request Forgery (CSRF)

<0:31.6.0-1.0.1.el6_6
  • H
Access Restriction Bypass

<0:31.6.0-1.0.1.el6_6
  • H
Access Restriction Bypass

<0:31.6.0-1.0.1.el6_6
  • H
Out-of-Bounds

<0:31.5.0-1.0.1.el6_6
  • H
CVE-2015-0831

<0:31.5.0-1.0.1.el6_6
  • H
CVE-2015-0836

<0:31.5.0-1.0.1.el6_6
  • H
Information Exposure

<0:31.5.0-1.0.1.el6_6
  • H
CVE-2014-8634

<0:31.4.0-1.0.1.el6_6
  • H
CVE-2014-8639

<0:31.4.0-1.0.1.el6_6
  • H
Cross-site Request Forgery (CSRF)

<0:31.4.0-1.0.1.el6_6
  • H
Improper Input Validation

<0:31.3.0-1.0.1.el6_6
  • H
Improper Input Validation

<0:31.3.0-1.0.1.el6_6
  • H
Improper Input Validation

<0:31.3.0-1.0.1.el6_6
  • H
Out-of-Bounds

<0:31.3.0-1.0.1.el6_6
  • H
CVE-2014-1592

<0:31.3.0-1.0.1.el6_6
  • H
CVE-2014-1574

<0:31.2.0-3.0.1.el6_6
  • H
CVE-2014-1577

<0:31.2.0-3.0.1.el6_6
  • H
Out-of-Bounds

<0:31.2.0-3.0.1.el6_6
  • H
CVE-2014-1581

<0:31.2.0-3.0.1.el6_6
  • H
CVE-2014-1567

<0:24.8.0-1.0.1.el6_5
  • H
Out-of-Bounds

<0:24.8.0-1.0.1.el6_5
  • H
CVE-2014-1518

<0:24.5.0-1.0.1.el6_5
  • H
Out-of-bounds Write

<0:24.5.0-1.0.1.el6_5
  • H
Arbitrary Code Injection

<0:24.7.0-1.0.1.el6_5
  • H
CVE-2014-1547

<0:24.7.0-1.0.1.el6_5
  • H
Arbitrary Code Injection

<0:24.7.0-1.0.1.el6_5
  • H
CVE-2014-1555

<0:24.7.0-1.0.1.el6_5
  • H
CVE-2014-1538

<0:24.6.0-1.0.1.el6_5
  • H
CVE-2014-1541

<0:24.6.0-1.0.1.el6_5
  • H
CVE-2014-1533

<0:24.6.0-1.0.1.el6_5
  • H
Cross-site Scripting (XSS)

<0:24.5.0-1.0.1.el6_5
  • H
Buffer Overflow

<0:24.5.0-1.0.1.el6_5
  • H
Use After Free

<0:24.5.0-1.0.1.el6_5
  • H
Improper Privilege Management

<0:24.5.0-1.0.1.el6_5
  • H
Use After Free

<0:24.5.0-1.0.1.el6_5
  • H
Out-of-bounds Read

<0:24.4.0-1.0.1.el6_5
  • H
Information Exposure

<0:24.4.0-1.0.1.el6_5
  • H
Improper Privilege Management

<0:24.4.0-1.0.1.el6_5
  • H
Improper Privilege Management

<0:24.4.0-1.0.1.el6_5
  • H
Out-of-Bounds

<0:24.4.0-1.0.1.el6_5
  • H
Out-of-bounds Read

<0:24.4.0-1.0.1.el6_5
  • H
Buffer Overflow

<0:24.4.0-1.0.1.el6_5
  • H
Use After Free

<0:24.4.0-1.0.1.el6_5
  • H
Out-of-bounds Write

<0:24.4.0-1.0.1.el6_5
  • H
Out-of-bounds Write

<0:24.4.0-1.0.1.el6_5
  • H
Out-of-bounds Write

<0:24.3.0-2.0.1.el6_5
  • H
CVE-2014-1481

<0:24.3.0-2.0.1.el6_5
  • H
Use After Free

<0:24.3.0-2.0.1.el6_5
  • H
CVE-2014-1477

<0:24.3.0-2.0.1.el6_5
  • H
CVE-2014-1479

<0:24.3.0-2.0.1.el6_5
  • H
Origin Validation Error

<0:24.3.0-2.0.1.el6_5
  • H
Cross-site Scripting (XSS)

<0:24.2.0-1.0.1.el6_5
  • H
Arbitrary Code Injection

<0:24.2.0-1.0.1.el6_5
  • H
Use After Free

<0:24.2.0-1.0.1.el6_5
  • H
Use After Free

<0:24.2.0-1.0.1.el6_5
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:24.2.0-1.0.1.el6_5
  • H
Use After Free

<0:24.2.0-1.0.1.el6_5
  • H
CVE-2013-5609

<0:24.2.0-1.0.1.el6_5
  • H
CVE-2013-5597

<0:17.0.10-1.0.1.el6_4
  • H
CVE-2013-5590

<0:17.0.10-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.10-1.0.1.el6_4
  • H
CVE-2013-5599

<0:17.0.10-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.10-1.0.1.el6_4
  • H
CVE-2013-5601

<0:17.0.10-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.10-1.0.1.el6_4
  • H
CVE-2013-5600

<0:17.0.10-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.9-1.0.1.el6_4
  • H
Improper Input Validation

<0:17.0.9-1.0.1.el6_4
  • H
Access Restriction Bypass

<0:17.0.9-1.0.1.el6_4
  • H
Resource Management Errors

<0:17.0.9-1.0.1.el6_4
  • H
CVE-2013-1701

<0:17.0.8-5.0.1.el6_4
  • H
Access Restriction Bypass

<0:17.0.8-5.0.1.el6_4
  • H
Cross-site Scripting (XSS)

<0:17.0.8-5.0.1.el6_4
  • H
Access Restriction Bypass

<0:17.0.8-5.0.1.el6_4
  • H
Improper Input Validation

<0:17.0.8-5.0.1.el6_4
  • H
Access Restriction Bypass

<0:17.0.8-5.0.1.el6_4
  • H
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • H
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • H
CVE-2013-1682

<0:17.0.7-1.0.1.el6_4
  • H
Resource Management Errors

<0:17.0.7-1.0.1.el6_4
  • H
Improper Input Validation

<0:17.0.7-1.0.1.el6_4
  • H
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • H
Access Restriction Bypass

<0:17.0.7-1.0.1.el6_4
  • H
Resource Management Errors

<0:17.0.7-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.7-1.0.1.el6_4
  • H
Resource Management Errors

<0:17.0.7-1.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.6-2.0.1.el6_4
  • H
Resource Management Errors

<0:17.0.6-2.0.1.el6_4
  • H
Resource Management Errors

<0:17.0.6-2.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.6-2.0.1.el6_4
  • H
Resource Management Errors

<0:17.0.6-2.0.1.el6_4
  • H
Cross-site Scripting (XSS)

<0:17.0.6-2.0.1.el6_4
  • H
Out-of-Bounds

<0:17.0.6-2.0.1.el6_4
  • H
Improper Initialization

<0:17.0.6-2.0.1.el6_4
  • H
Resource Management Errors

<0:17.0.6-2.0.1.el6_4
  • H
CVE-2013-0801

<0:17.0.6-2.0.1.el6_4
  • H
CVE-2013-0796

<0:17.0.5-1.0.1.el6_4
  • H
Access Restriction Bypass

<0:17.0.5-1.0.1.el6_4
  • H
CVE-2013-0800

<0:17.0.5-1.0.1.el6_4
  • H
CVE-2013-0788

<0:17.0.5-1.0.1.el6_4
  • H
Cross-site Scripting (XSS)

<0:17.0.5-1.0.1.el6_4
  • H
Resource Management Errors

<0:17.0.3-2.0.1.el6_4
  • C
Out-of-bounds Write

<0:17.0.3-1.0.1.el6_3
  • C
CVE-2013-0783

<0:17.0.3-1.0.1.el6_3
  • C
Use After Free

<0:17.0.3-1.0.1.el6_3
  • C
Use After Free

<0:17.0.3-1.0.1.el6_3
  • C
Improper Certificate Validation

<0:17.0.3-1.0.1.el6_3
  • C
CVE-2013-0746

<0:10.0.12-3.0.1.el6_3
  • C
Information Exposure

<0:10.0.12-3.0.1.el6_3
  • C
Use After Free

<0:10.0.12-3.0.1.el6_3
  • C
Use After Free

<0:10.0.12-3.0.1.el6_3
  • C
Arbitrary Code Injection

<0:10.0.12-3.0.1.el6_3
  • C
Use After Free

<0:10.0.12-3.0.1.el6_3
  • C
CVE-2013-0769

<0:10.0.12-3.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Integer Overflow or Wraparound

<0:10.0.12-3.0.1.el6_3
  • C
Use After Free

<0:10.0.12-3.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Improper Authentication

<0:10.0.12-3.0.1.el6_3
  • C
Out-of-bounds Read

<0:10.0.12-3.0.1.el6_3
  • C
Use After Free

<0:10.0.12-3.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Integer Overflow or Wraparound

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
CVE-2012-5842

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Use After Free

<0:10.0.11-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el6_3
  • H
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el6_3
  • H
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el6_3
  • H
Arbitrary Code Injection

<0:10.0.10-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-bounds Read

<0:10.0.8-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el6_3
  • C
Origin Validation Error

<0:10.0.8-2.0.1.el6_3
  • C
Improper Privilege Management

<0:10.0.8-1.0.1.el6_3
  • C
CVE-2012-3982

<0:10.0.8-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Improper Input Validation

<0:10.0.8-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.8-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Use After Free

<0:10.0.8-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.8-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el6_3
  • C
CVE-2012-3962

<0:10.0.7-1.0.1.el6_3
  • C
Numeric Errors

<0:10.0.7-1.0.1.el6_3
  • C
Arbitrary Code Injection

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Information Exposure

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Out-of-bounds Write

<0:10.0.7-1.0.1.el6_3
  • C
Use After Free

<0:10.0.7-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Out-of-Bounds

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el6_3
  • C
Cross-site Scripting (XSS)

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1955

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1967

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1964

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2012-1948

<0:10.0.6-1.0.1.el6_3
  • C
Improper Input Validation

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el6_3
  • C
CVE-2011-3101

<0:10.0.5-2.0.1.el6_2
  • C
CVE-2012-1938

<0:10.0.5-2.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.5-2.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.5-2.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.5-2.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.5-2.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.5-2.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.5-2.0.1.el6_2
  • C
Information Exposure

<0:10.0.5-2.0.1.el6_2
  • C
CVE-2012-1937

<0:10.0.5-2.0.1.el6_2
  • C
CVE-2012-0479

<0:10.0.4-1.0.1.el6_2
  • C
Incorrect Calculation

<0:10.0.4-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.4-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el6_2
  • C
Numeric Errors

<0:10.0.4-1.0.1.el6_2
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el6_2
  • C
CVE-2012-0467

<0:10.0.4-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:10.0.3-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el6_2
  • C
Information Exposure

<0:10.0.3-1.0.1.el6_2
  • C
Arbitrary Code Injection

<0:10.0.3-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el6_2
  • C
CVE-2012-0461

<0:10.0.3-1.0.1.el6_2
  • C
CVE-2012-0462

<0:10.0.3-1.0.1.el6_2
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el6_2
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el6_2
  • C
Integer Overflow or Wraparound

<0:3.1.18-2.0.1.el6_2
  • C
Out-of-Bounds

<0:3.1.18-1.0.1.el6_2
  • C
CVE-2012-0442

<0:3.1.18-1.0.1.el6_2
  • C
Use After Free

<0:3.1.18-1.0.1.el6_2
  • C
Information Exposure

<0:3.1.18-1.0.1.el6_2
  • C
Cross-site Scripting (XSS)

<0:3.1.16-2.0.1.el6_1
  • C
Out-of-Bounds

<0:3.1.16-2.0.1.el6_1
  • C
Improper Input Validation

<0:3.1.16-2.0.1.el6_1
  • C
Access Restriction Bypass

<0:3.1.15-1.0.1.el6_1
  • C
Numeric Errors

<0:3.1.15-1.0.1.el6_1
  • C
Arbitrary Code Injection

<0:3.1.15-1.0.1.el6_1
  • C
Access Restriction Bypass

<0:3.1.15-1.0.1.el6_1
  • C
CVE-2011-2995

<0:3.1.15-1.0.1.el6_1
  • C
CVE-2011-2982

<0:3.1.12-1.0.1.el6_1
  • C
Arbitrary Code Injection

<0:3.1.12-1.0.1.el6_1
  • C
Arbitrary Code Injection

<0:3.1.12-1.0.1.el6_1
  • C
Arbitrary Code Injection

<0:3.1.11-2.0.1.el6_1
  • C
CVE-2011-0074

<0:3.1.10-1.0.1.el6_0
  • C
Resource Management Errors

<0:3.1.11-2.0.1.el6_1
  • C
Resource Management Errors

<0:3.1.11-2.0.1.el6_1
  • C
CVE-2011-2375

<0:3.1.11-2.0.1.el6_1
  • C
Resource Management Errors

<0:3.1.11-2.0.1.el6_1
  • C
Access Restriction Bypass

<0:3.1.11-2.0.1.el6_1
  • C
Out-of-Bounds

<0:3.1.11-2.0.1.el6_1
  • C
CVE-2011-2376

<0:3.1.11-2.0.1.el6_1
  • C
CVE-2011-2374

<0:3.1.11-2.0.1.el6_1
  • C
CVE-2011-2364

<0:3.1.11-2.0.1.el6_1
  • C
CVE-2011-2365

<0:3.1.11-2.0.1.el6_1
  • C
CVE-2011-0080

<0:3.1.10-1.0.1.el6_0
  • C
CVE-2011-0075

<0:3.1.10-1.0.1.el6_0
  • C
Directory Traversal

<0:3.1.10-1.0.1.el6_0
  • C
CVE-2011-0070

<0:3.1.10-1.0.1.el6_0
  • C
Improper Input Validation

<0:3.1.10-1.0.1.el6_0
  • C
Improper Input Validation

<0:3.1.8-4.0.2.el6_0
  • C
CVE-2011-0081

<0:3.1.10-1.0.1.el6_0
  • C
CVE-2011-0078

<0:3.1.10-1.0.1.el6_0
  • C
CVE-2011-0077

<0:3.1.10-1.0.1.el6_0
  • C
Out-of-Bounds

<0:3.1.8-4.0.2.el6_0
  • C
CVE-2011-0062

<0:3.1.8-4.0.2.el6_0
  • C
CVE-2011-0053

<0:3.1.8-4.0.2.el6_0
  • M
Out-of-Bounds

<0:3.1.7-3.0.1.el6_0
  • M
Out-of-Bounds

<0:3.1.7-3.0.1.el6_0
  • M
Improper Input Validation

<0:3.1.7-3.0.1.el6_0