firefox vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the firefox package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<0:128.4.0-1.0.1.el7_9
  • M
CVE-2024-10458

<0:128.4.0-1.0.1.el7_9
  • M
CVE-2024-10460

<0:128.4.0-1.0.1.el7_9
  • M
CVE-2024-10466

<0:128.4.0-1.0.1.el7_9
  • M
Cross-site Scripting (XSS)

<0:128.4.0-1.0.1.el7_9
  • M
Authentication Bypass

<0:128.4.0-1.0.1.el7_9
  • M
Out-of-bounds Write

<0:128.4.0-1.0.1.el7_9
  • M
Authentication Bypass

<0:128.4.0-1.0.1.el7_9
  • M
Out-of-bounds Read

<0:128.4.0-1.0.1.el7_9
  • M
Information Exposure

<0:128.4.0-1.0.1.el7_9
  • H
CVE-2024-9396

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-8900

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-9394

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-9393

<0:128.3.0-1.0.1.el7_9
  • H
Use After Free

<0:128.3.1-2.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-9398

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-9400

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-9401

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-9402

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-9399

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-8382

<0:128.2.0-1.0.1.el7_9
  • H
CVE-2024-7652

<0:128.2.0-1.0.1.el7_9
  • H
CVE-2024-9392

<0:128.3.0-1.0.1.el7_9
  • H
CVE-2024-9403

<0:128.3.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:128.2.0-1.0.1.el7_9
  • H
Open Redirect

<0:128.2.0-1.0.1.el7_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:128.2.0-1.0.1.el7_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:128.2.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:128.2.0-1.0.1.el7_9
  • H
CVE-2024-8383

<0:128.2.0-1.0.1.el7_9
  • H
Improper Handling of Exceptional Conditions

<0:115.12.0-1.0.3.el7_9
  • H
Incorrect Default Permissions

<0:115.12.0-1.0.3.el7_9
  • H
Use After Free

<0:115.12.0-1.0.3.el7_9
  • H
Use After Free

<0:115.12.0-1.0.3.el7_9
  • H
Cross-site Scripting (XSS)

<0:115.12.0-1.0.3.el7_9
  • H
CVE-2024-7529

<0:115.12.0-1.0.3.el7_9
  • H
Out-of-bounds Read

<0:115.12.0-1.0.3.el7_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:115.12.0-1.0.3.el7_9
  • H
Use of Uninitialized Resource

<0:115.12.0-1.0.3.el7_9
  • H
CVE-2024-7518

<0:115.12.0-1.0.3.el7_9
  • H
Out-of-bounds Write

<0:115.12.0-1.0.3.el7_9
  • H
CVE-2024-5691

<0:115.12.0-1.0.1.el7_9
  • H
CVE-2024-5700

<0:115.12.0-1.0.1.el7_9
  • H
CVE-2024-5696

<0:115.12.0-1.0.1.el7_9
  • H
Information Exposure

<0:115.12.0-1.0.1.el7_9
  • H
CVE-2024-5693

<0:115.12.0-1.0.1.el7_9
  • H
CVE-2024-5702

<0:115.12.0-1.0.1.el7_9
  • H
CVE-2024-5688

<0:115.12.0-1.0.1.el7_9
  • H
CVE-2024-4367

<0:115.11.0-1.0.1.el7_9
  • H
CVE-2024-4769

<0:115.11.0-1.0.1.el7_9
  • H
CVE-2024-4767

<0:115.11.0-1.0.1.el7_9
  • H
CVE-2024-4777

<0:115.11.0-1.0.1.el7_9
  • H
CVE-2024-4770

<0:115.11.0-1.0.1.el7_9
  • H
CVE-2024-4768

<0:115.11.0-1.0.1.el7_9
  • H
CVE-2024-3852

<0:115.10.0-1.0.1.el7_9
  • H
CVE-2024-2609

<0:115.10.0-1.0.1.el7_9
  • H
CVE-2024-3864

<0:115.10.0-1.0.1.el7_9
  • H
CVE-2024-3861

<0:115.10.0-1.0.1.el7_9
  • H
CVE-2024-3857

<0:115.10.0-1.0.1.el7_9
  • H
CVE-2024-3854

<0:115.10.0-1.0.1.el7_9
  • H
CVE-2024-3859

<0:115.10.0-1.0.1.el7_9
  • C
CVE-2024-29944

<0:115.9.1-1.0.1.el7_9
  • C
CVE-2024-2612

<0:115.9.1-1.0.1.el7_9
  • C
CVE-2024-2611

<0:115.9.1-1.0.1.el7_9
  • C
CVE-2023-5388

<0:115.9.1-1.0.1.el7_9
  • C
CVE-2024-2616

<0:115.9.1-1.0.1.el7_9
  • C
CVE-2024-2607

<0:115.9.1-1.0.1.el7_9
  • C
CVE-2024-2614

<0:115.9.1-1.0.1.el7_9
  • C
CVE-2024-2610

<0:115.9.1-1.0.1.el7_9
  • C
CVE-2024-2608

<0:115.9.1-1.0.1.el7_9
  • C
Unchecked Return Value

<0:115.9.1-1.0.1.el7_9
  • H
CVE-2024-1548

<0:115.8.0-1.0.1.el7_9
  • H
CVE-2024-1551

<0:115.8.0-1.0.1.el7_9
  • H
CVE-2024-1547

<0:115.8.0-1.0.1.el7_9
  • H
CVE-2024-1546

<0:115.8.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:115.8.0-1.0.1.el7_9
  • H
Incorrect Conversion between Numeric Types

<0:115.8.0-1.0.1.el7_9
  • H
CVE-2024-1553

<0:115.8.0-1.0.1.el7_9
  • H
CVE-2024-1549

<0:115.8.0-1.0.1.el7_9
  • H
CVE-2024-0746

<0:115.7.0-1.0.1.el7_9
  • H
CVE-2024-0755

<0:115.7.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.7.0-1.0.1.el7_9
  • H
CVE-2024-0747

<0:115.7.0-1.0.1.el7_9
  • H
CVE-2024-0742

<0:115.7.0-1.0.1.el7_9
  • H
Origin Validation Error

<0:115.7.0-1.0.1.el7_9
  • H
Improper Privilege Management

<0:115.7.0-1.0.1.el7_9
  • H
CVE-2024-0750

<0:115.7.0-1.0.1.el7_9
  • H
CVE-2024-0753

<0:115.7.0-1.0.1.el7_9
  • H
CVE-2023-6865

<0:115.6.0-1.0.1.el7_9
  • H
CVE-2023-6863

<0:115.6.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.6.0-1.0.1.el7_9
  • H
Use After Free

<0:115.6.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:115.6.0-1.0.1.el7_9
  • H
CVE-2023-6860

<0:115.6.0-1.0.1.el7_9
  • H
Use After Free

<0:115.6.0-1.0.1.el7_9
  • H
Race Condition

<0:115.6.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.6.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.6.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.6.0-1.0.1.el7_9
  • H
Out-of-bounds Read

<0:115.5.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:115.5.0-1.0.1.el7_9
  • H
Directory Traversal

<0:115.5.0-1.0.1.el7_9
  • H
CVE-2023-6208

<0:115.5.0-1.0.1.el7_9
  • H
Use After Free

<0:115.5.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.5.0-1.0.1.el7_9
  • H
Use After Free

<0:115.5.0-1.0.1.el7_9
  • H
CVE-2023-5732

<0:115.4.0-1.0.1.el7_9
  • H
CVE-2023-5725

<0:115.4.0-1.0.1.el7_9
  • H
CVE-2023-5728

<0:115.4.0-1.0.1.el7_9
  • H
CVE-2023-5724

<0:115.4.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.4.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:115.4.0-1.0.1.el7_9
  • H
Improper Handling of Exceptional Conditions

<0:115.4.0-1.0.1.el7_9
  • H
Use After Free

<0:115.3.1-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.3.1-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.3.1-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:115.3.1-1.0.1.el7_9
  • H
Use After Free

<0:115.3.1-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.15.1-1.0.1.el7_9
  • H
Use After Free

<0:102.15.0-1.0.1.el7_9
  • H
CVE-2023-4581

<0:102.15.0-1.0.1.el7_9
  • H
CVE-2023-4577

<0:102.15.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.15.0-1.0.1.el7_9
  • H
Allocation of Resources Without Limits or Throttling

<0:102.15.0-1.0.1.el7_9
  • H
CVE-2023-4583

<0:102.15.0-1.0.1.el7_9
  • H
Link Following

<0:102.15.0-1.0.1.el7_9
  • H
Use After Free

<0:102.15.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.15.0-1.0.1.el7_9
  • H
CVE-2023-4051

<0:102.15.0-1.0.1.el7_9
  • H
Missing Encryption of Sensitive Data

<0:102.15.0-1.0.1.el7_9
  • H
Use After Free

<0:102.15.0-1.0.1.el7_9
  • H
CVE-2023-4047

<0:102.14.0-1.0.1.el7_9
  • H
Race Condition

<0:102.14.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.14.0-1.0.1.el7_9
  • H
Out-of-bounds Read

<0:102.14.0-1.0.1.el7_9
  • H
CVE-2023-4055

<0:102.14.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.14.0-1.0.1.el7_9
  • H
CVE-2023-4046

<0:102.14.0-1.0.1.el7_9
  • H
Origin Validation Error

<0:102.14.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.14.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.13.0-2.0.1.el7_9
  • H
CVE-2023-37208

<0:102.13.0-2.0.1.el7_9
  • H
Use After Free

<0:102.13.0-2.0.1.el7_9
  • H
Use After Free

<0:102.13.0-2.0.1.el7_9
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:102.13.0-2.0.1.el7_9
  • H
Improper Certificate Validation

<0:102.12.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.12.0-1.0.1.el7_9
  • H
Out-of-bounds Read

<0:102.11.0-2.0.1.el7_9
  • H
Authentication Bypass

<0:102.11.0-2.0.1.el7_9
  • H
CVE-2023-32205

<0:102.11.0-2.0.1.el7_9
  • H
CVE-2023-32211

<0:102.11.0-2.0.1.el7_9
  • H
CVE-2023-32212

<0:102.11.0-2.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.11.0-2.0.1.el7_9
  • H
Use of Uninitialized Resource

<0:102.11.0-2.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.10.0-1.0.1.el7_9
  • H
CVE-2023-29548

<0:102.10.0-1.0.1.el7_9
  • H
NULL Pointer Dereference

<0:102.10.0-1.0.1.el7_9
  • H
CVE-2023-29535

<0:102.10.0-1.0.1.el7_9
  • H
Improper Encoding or Escaping of Output

<0:102.10.0-1.0.1.el7_9
  • H
Use After Free

<0:102.10.0-1.0.1.el7_9
  • H
CVE-2023-29533

<0:102.10.0-1.0.1.el7_9
  • H
CVE-2023-29550

<0:102.10.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.9.0-3.0.1.el7_9
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.0.1.el7_9
  • H
CVE-2023-28164

<0:102.9.0-3.0.1.el7_9
  • H
CVE-2023-25751

<0:102.9.0-3.0.1.el7_9
  • H
CVE-2023-25752

<0:102.9.0-3.0.1.el7_9
  • H
CVE-2023-25742

<0:102.8.0-2.0.1.el7_9
  • H
CVE-2023-0767

<0:102.8.0-2.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.8.0-2.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.8.0-2.0.1.el7_9
  • H
Authentication Bypass

<0:102.8.0-2.0.1.el7_9
  • H
Use After Free

<0:102.8.0-2.0.1.el7_9
  • H
CVE-2023-25730

<0:102.8.0-2.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.8.0-2.0.1.el7_9
  • H
CVE-2023-25728

<0:102.8.0-2.0.1.el7_9
  • H
Use After Free

<0:102.8.0-2.0.1.el7_9
  • H
CVE-2023-25737

<0:102.8.0-2.0.1.el7_9
  • H
CVE-2023-25729

<0:102.8.0-2.0.1.el7_9
  • H
Improper Encoding or Escaping of Output

<0:102.7.0-1.0.1.el7_9
  • H
Origin Validation Error

<0:102.7.0-1.0.1.el7_9
  • H
CVE-2022-46877

<0:102.7.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.7.0-1.0.1.el7_9
  • H
CVE-2023-23598

<0:102.7.0-1.0.1.el7_9
  • H
CVE-2023-23603

<0:102.7.0-1.0.1.el7_9
  • H
Improper Check for Unusual or Exceptional Conditions

<0:102.7.0-1.0.1.el7_9
  • H
CVE-2022-46871

<0:102.7.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.6.0-1.0.1.el7_9
  • H
CVE-2022-46872

<0:102.6.0-1.0.1.el7_9
  • H
CVE-2022-46874

<0:102.6.0-1.0.1.el7_9
  • H
Use After Free

<0:102.6.0-1.0.1.el7_9
  • H
Use After Free

<0:102.6.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.6.0-1.0.1.el7_9
  • H
Link Following

<0:102.5.0-1.0.1.el7_9
  • H
CVE-2022-45410

<0:102.5.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:102.5.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:102.5.0-1.0.1.el7_9
  • H
Information Exposure

<0:102.5.0-1.0.1.el7_9
  • H
Use After Free

<0:102.5.0-1.0.1.el7_9
  • H
Cross-site Scripting (XSS)

<0:102.5.0-1.0.1.el7_9
  • H
Information Exposure

<0:102.5.0-1.0.1.el7_9
  • H
Use After Free

<0:102.5.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.5.0-1.0.1.el7_9
  • H
Use After Free

<0:102.5.0-1.0.1.el7_9
  • H
CVE-2022-45408

<0:102.5.0-1.0.1.el7_9
  • H
CVE-2022-45404

<0:102.5.0-1.0.1.el7_9
  • H
NULL Pointer Dereference

<0:102.4.0-1.0.1.el7_9
  • H
Origin Validation Error

<0:102.4.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.4.0-1.0.1.el7_9
  • H
CVE-2022-42929

<0:102.4.0-1.0.1.el7_9
  • H
Use After Free

<0:102.3.0-7.0.1.el7_9
  • H
Insecure Storage of Sensitive Information

<0:102.3.0-6.0.1.el7_9
  • H
Arbitrary Code Injection

<0:102.3.0-6.0.1.el7_9
  • H
Out-of-bounds Write

<0:102.3.0-6.0.1.el7_9
  • H
Cross-site Scripting (XSS)

<0:102.3.0-6.0.1.el7_9
  • H
CVE-2022-40957

<0:102.3.0-6.0.1.el7_9
  • H
Use After Free

<0:102.3.0-6.0.1.el7_9
  • H
Out-of-bounds Write

<0:91.13.0-1.0.1.el7_9
  • H
Origin Validation Error

<0:91.13.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:91.13.0-1.0.1.el7_9
  • H
Use After Free

<0:91.13.0-1.0.1.el7_9
  • H
Improper Preservation of Permissions

<0:91.13.0-1.0.1.el7_9
  • H
Race Condition

<0:91.12.0-2.0.1.el7_9
  • H
Out-of-bounds Write

<0:91.12.0-2.0.1.el7_9
  • H
CVE-2022-36319

<0:91.12.0-2.0.1.el7_9
  • H
CVE-2022-34472

<0:91.11.0-2.0.1.el7_9
  • H
Use After Free

<0:91.11.0-2.0.1.el7_9
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:91.11.0-2.0.1.el7_9
  • H
Cross-site Scripting (XSS)

<0:91.11.0-2.0.1.el7_9
  • H
CVE-2022-34468

<0:91.11.0-2.0.1.el7_9
  • H
Use After Free

<0:91.11.0-2.0.1.el7_9
  • H
Integer Overflow or Wraparound

<0:91.11.0-2.0.1.el7_9
  • H
CVE-2022-34479

<0:91.11.0-2.0.1.el7_9
  • H
Out-of-bounds Read

<0:91.10.0-1.0.1.el7_9
  • H
Authentication Bypass

<0:91.10.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:91.10.0-1.0.1.el7_9
  • H
CVE-2022-31742

<0:91.10.0-1.0.1.el7_9
  • H
CVE-2022-31740

<0:91.10.0-1.0.1.el7_9
  • H
CVE-2022-31736

<0:91.10.0-1.0.1.el7_9
  • H
Use of Uninitialized Resource

<0:91.10.0-1.0.1.el7_9
  • C
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:91.9.1-1.0.1.el7_9
  • C
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:91.9.1-1.0.1.el7_9
  • H
CVE-2022-29914

<0:91.9.0-1.0.1.el7_9
  • H
Open Redirect

<0:91.9.0-1.0.1.el7_9
  • H
CVE-2022-29916

<0:91.9.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:91.9.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:91.9.0-1.0.1.el7_9
  • H
Incorrect Default Permissions

<0:91.9.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:91.8.0-1.0.1.el7_9
  • H
Inefficient Regular Expression Complexity

<0:91.8.0-1.0.1.el7_9
  • H
Out-of-bounds Read

<0:91.8.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:91.8.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:91.8.0-1.0.1.el7_9
  • H
Use After Free

<0:91.8.0-1.0.1.el7_9
  • H
Use After Free

<0:91.8.0-1.0.1.el7_9
  • H
Use After Free

<0:91.8.0-1.0.1.el7_9
  • C
Integer Overflow or Wraparound

<0:91.7.0-3.0.1.el7_9
  • H
CVE-2022-22761

<0:91.6.0-1.0.1.el7_9
  • H
Incorrect Authorization

<0:91.6.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:91.6.0-1.0.1.el7_9
  • H
CVE-2022-22745

<0:91.5.0-1.0.2.el7_9
  • H
CVE-2022-22743

<0:91.5.0-1.0.1.el7_9
  • C
CVE-2022-26386

<0:91.7.0-3.0.1.el7_9
  • C
CVE-2022-26383

<0:91.7.0-3.0.1.el7_9
  • C
Exposure of Resource to Wrong Sphere

<0:91.7.0-3.0.1.el7_9
  • C
Time-of-check Time-of-use (TOCTOU)

<0:91.7.0-3.0.1.el7_9
  • C
CVE-2022-26384

<0:91.7.0-3.0.1.el7_9
  • C
Use After Free

<0:91.7.0-3.0.1.el7_9
  • C
Improper Encoding or Escaping of Output

<0:91.7.0-3.0.1.el7_9
  • C
Use After Free

<0:91.7.0-3.0.1.el7_9
  • C
Use After Free

<0:91.7.0-3.0.1.el7_9
  • H
CVE-2022-22756

<0:91.6.0-1.0.1.el7_9
  • H
CVE-2022-22759

<0:91.6.0-1.0.1.el7_9
  • H
Information Exposure

<0:91.6.0-1.0.1.el7_9
  • H
CVE-2022-22763

<0:91.6.0-1.0.1.el7_9
  • H
Use After Free

<0:91.5.0-1.0.2.el7_9
  • H
Out-of-bounds Read

<0:91.5.0-1.0.2.el7_9
  • H
Out-of-bounds Write

<0:91.5.0-1.0.1.el7_9
  • H
CVE-2022-22748

<0:91.5.0-1.0.2.el7_9
  • H
Race Condition

<0:91.5.0-1.0.1.el7_9
  • H
XML Injection

<0:91.5.0-1.0.2.el7_9
  • H
Out-of-bounds Write

<0:91.5.0-1.0.2.el7_9
  • H
CVE-2022-22741

<0:91.5.0-1.0.2.el7_9
  • H
CVE-2022-22739

<0:91.5.0-1.0.2.el7_9
  • H
Improper Certificate Validation

<0:91.5.0-1.0.2.el7_9
  • H
Race Condition

<0:91.4.0-1.0.1.el7_9
  • H
Cross-site Scripting (XSS)

<0:91.4.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:91.4.0-1.0.1.el7_9
  • H
CVE-2021-43541

<0:91.4.0-1.0.1.el7_9
  • H
Use After Free

<0:91.4.0-1.0.1.el7_9
  • H
Information Exposure

<0:91.4.0-1.0.1.el7_9
  • H
Excessive Iteration

<0:91.4.0-1.0.1.el7_9
  • H
Information Exposure

<0:91.4.0-1.0.1.el7_9
  • H
Incorrect Type Conversion or Cast

<0:91.4.0-1.0.1.el7_9
  • H
CVE-2021-38501

<0:91.2.0-4.0.1.el7_9
  • H
CVE-2021-38500

<0:91.2.0-4.0.1.el7_9
  • H
Origin Validation Error

<0:91.3.0-1.0.1.el7_9
  • H
Incorrect Authorization

<0:91.3.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:91.3.0-1.0.1.el7_9
  • H
Use After Free

<0:91.2.0-4.0.1.el7_9
  • H
Use After Free

<0:91.3.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:91.3.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:91.3.0-1.0.1.el7_9
  • H
Race Condition

<0:91.2.0-4.0.1.el7_9
  • H
Use After Free

<0:91.2.0-4.0.1.el7_9
  • H
Origin Validation Error

<0:91.2.0-4.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.12.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.12.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.14.0-1.0.1.el7_9
  • H
Use After Free

<0:78.13.0-2.0.1.el7_9
  • H
Race Condition

<0:78.13.0-2.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.13.0-2.0.1.el7_9
  • H
Out-of-bounds Read

<0:78.13.0-2.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.13.0-2.0.1.el7_9
  • H
Missing Initialization of Resource

<0:78.13.0-2.0.1.el7_9
  • H
Use After Free

<0:78.12.0-1.0.1.el7_9
  • C
Out-of-bounds Write

<0:78.11.0-3.0.1.el7_9
  • H
Insufficient Verification of Data Authenticity

<0:78.10.0-1.0.1.el7_9
  • H
Operation on a Resource after Expiration or Release

<0:78.10.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.9.0-1.0.1.el7_9
  • H
Incorrect Calculation

<0:78.10.0-1.0.1.el7_9
  • H
Missing Initialization of Resource

<0:78.10.0-1.0.1.el7_9
  • H
Improper Privilege Management

<0:78.10.0-1.0.1.el7_9
  • H
Integer Overflow or Wraparound

<0:78.10.0-1.0.1.el7_9
  • H
CVE-2021-23961

<0:78.10.0-1.0.1.el7_9
  • H
Arbitrary Code Injection

<0:78.10.0-1.0.1.el7_9
  • H
CVE-2021-23960

<0:78.7.0-2.0.1.el7_9
  • H
Authentication Bypass

<0:78.9.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.9.0-1.0.1.el7_9
  • H
Inadequate Encryption Strength

<0:78.9.0-1.0.1.el7_9
  • C
Information Exposure

<0:78.8.0-1.0.1.el7_9
  • C
Information Exposure

<0:78.8.0-1.0.1.el7_9
  • H
CVE-2020-26976

<0:78.7.0-2.0.1.el7_9
  • C
Out-of-bounds Write

<0:78.8.0-1.0.1.el7_9
  • C
CVE-2021-23969

<0:78.8.0-1.0.1.el7_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:78.7.0-2.0.1.el7_9
  • H
CVE-2021-23953

<0:78.7.0-2.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.7.0-2.0.1.el7_9
  • C
Use After Free

<0:78.6.1-1.0.1.el7_9
  • H
CVE-2020-26973

<0:78.6.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.6.0-1.0.1.el7_9
  • H
CVE-2020-26978

<0:78.6.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.6.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.6.0-1.0.1.el7_9
  • H
Use of Uninitialized Resource

<0:78.6.0-1.0.1.el7_9
  • H
CVE-2020-35111

<0:78.6.0-1.0.1.el7_9
  • H
CVE-2020-16012

<0:78.5.0-1.0.1.el7_9
  • C
Use After Free

<0:78.4.1-1.0.1.el7_9
  • H
CVE-2020-26961

<0:78.5.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.5.0-1.0.1.el7_9
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:78.5.0-1.0.1.el7_9
  • H
Use After Free

<0:78.5.0-1.0.1.el7_9
  • H
Use After Free

<0:78.5.0-1.0.1.el7_9
  • H
Cross-site Scripting (XSS)

<0:78.5.0-1.0.1.el7_9
  • H
Cross-site Scripting (XSS)

<0:78.5.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:78.5.0-1.0.1.el7_9
  • H
Cross-site Scripting (XSS)

<0:78.5.0-1.0.1.el7_9
  • H
Use After Free

<0:78.4.0-1.0.1.el7_9
  • H
Use After Free

<0:78.4.0-1.0.1.el7_9
  • H
Cross-site Scripting (XSS)

<0:78.3.0-1.0.1.el7_9
  • H
Use After Free

<0:78.3.0-1.0.1.el7_9
  • H
Improper Check for Unusual or Exceptional Conditions

<0:78.3.0-1.0.1.el7_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:78.3.0-1.0.1.el7_9
  • H
Out-of-bounds Read

<0:78.3.0-1.0.1.el7_9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:78.3.0-1.0.1.el7_9
  • H
Open Redirect

<0:78.3.0-1.0.1.el7_9
  • H
Use After Free

<0:78.3.0-1.0.1.el7_9
  • H
Out-of-bounds Write

<0:78.3.0-1.0.1.el7_9
  • H
CVE-2020-15653

<0:78.3.0-1.0.1.el7_9
  • H
Incorrect Default Permissions

<0:78.3.0-1.0.1.el7_9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:78.3.0-1.0.1.el7_9
  • H
Use After Free

<0:68.12.0-1.0.3.el7_8
  • H
Use After Free

<0:68.11.0-1.0.1.el7_8
  • H
Incorrect Authorization

<0:68.12.0-1.0.1.el7_8
  • H
Information Exposure

<0:68.11.0-1.0.1.el7_8
  • H
Out-of-bounds Write

<0:68.11.0-1.0.1.el7_8
  • H
Use After Free

<0:68.10.0-1.0.1.el7_8
  • H
Reachable Assertion

<0:68.10.0-1.0.1.el7_8
  • H
Origin Validation Error

<0:68.11.0-1.0.1.el7_8
  • H
Insufficient Verification of Data Authenticity

<0:68.9.0-1.0.1.el7_8
  • H
Out-of-bounds Write

<0:68.9.0-1.0.1.el7_8
  • H
Out-of-bounds Read

<0:68.10.0-1.0.1.el7_8
  • H
Improper Certificate Validation

<0:68.10.0-1.0.1.el7_8
  • H
Race Condition

<0:68.10.0-1.0.1.el7_8
  • H
Race Condition

<0:68.9.0-1.0.1.el7_8
  • C
Directory Traversal

<0:68.8.0-1.0.1.el7_8
  • C
Out-of-bounds Write

<0:68.8.0-1.0.1.el7_8
  • C
Race Condition

<0:68.8.0-1.0.1.el7_8
  • C
Out-of-bounds Write

<0:68.8.0-1.0.1.el7_8
  • H
Use of Uninitialized Resource

<0:68.7.0-2.0.1.el7_8
  • H
Out-of-bounds Write

<0:68.7.0-2.0.1.el7_8
  • H
Out-of-bounds Write

<0:68.7.0-2.0.1.el7_8
  • C
Race Condition

<0:68.6.1-1.0.1.el7_8
  • C
Race Condition

<0:68.6.1-1.0.1.el7_8
  • H
Cross-site Scripting (XSS)

<0:68.5.0-2.0.1.el7_7
  • H
Out-of-bounds Write

<0:68.5.0-2.0.1.el7_7
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:68.4.1-1.0.1.el7_7
  • H
Out-of-bounds Write

<0:68.6.0-1.0.1.el7_7
  • H
Information Exposure

<0:68.6.0-1.0.1.el7_7
  • H
Use After Free

<0:68.6.0-1.0.1.el7_7
  • H
Use After Free

<0:68.6.0-1.0.1.el7_7
  • H
Arbitrary Command Injection

<0:68.6.0-1.0.1.el7_7
  • H
Out-of-bounds Read

<0:68.6.0-1.0.1.el7_7
  • H
Out-of-bounds Read

<0:68.6.0-1.0.1.el7_7
  • C
Cross-site Scripting (XSS)

<0:68.4.1-1.0.1.el7_7
  • H
Out-of-bounds Write

<0:68.5.0-2.0.1.el7_7
  • C
Cross-site Scripting (XSS)

<0:68.4.1-1.0.1.el7_7
  • C
Out-of-bounds Write

<0:68.4.1-1.0.1.el7_7
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:68.4.1-1.0.1.el7_7
  • C
Race Condition

<0:68.3.0-1.0.1.el7_7
  • C
Race Condition

<0:68.3.0-1.0.1.el7_7
  • C
Use After Free

<0:68.3.0-1.0.1.el7_7
  • C
Out-of-bounds Write

<0:68.3.0-1.0.1.el7_7
  • C
Out-of-bounds Write

<0:68.3.0-1.0.1.el7_7
  • C
Race Condition

<0:68.2.0-1.0.1.el7_7
  • C
Out-of-bounds Write

<0:68.2.0-1.0.1.el7_7
  • C
Cross-site Scripting (XSS)

<0:68.2.0-1.0.1.el7_7
  • C
Origin Validation Error

<0:68.2.0-1.0.1.el7_7
  • C
Out-of-bounds Write

<0:60.9.0-1.0.1.el7_7
  • C
Improper Authentication

<0:60.9.0-1.0.1.el7_7
  • C
Out-of-bounds Write

<0:68.2.0-1.0.1.el7_7
  • C
Buffer Overflow

<0:68.2.0-1.0.1.el7_7
  • C
Out-of-bounds Write

<0:68.2.0-1.0.1.el7_7
  • C
Use After Free

<0:68.2.0-1.0.1.el7_7
  • C
CVE-2019-9812

<0:60.9.0-1.0.1.el7_7
  • C
Use After Free

<0:60.9.0-1.0.1.el7_7
  • C
Inclusion of Functionality from Untrusted Control Sphere

<0:60.9.0-1.0.1.el7_7
  • C
Cross-site Scripting (XSS)

<0:60.9.0-1.0.1.el7_7
  • C
Use After Free

<0:60.9.0-1.0.1.el7_7
  • C
Information Exposure

<0:60.9.0-1.0.1.el7_7
  • C
Cross-site Request Forgery (CSRF)

<0:60.8.0-1.0.1.el7_6
  • C
CVE-2019-11711

<0:60.8.0-1.0.1.el7_6
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.7.0-1.0.1.el7_6
  • C
Out-of-bounds Write

<0:60.8.0-1.0.1.el7_6
  • C
Cross-site Scripting (XSS)

<0:60.8.0-1.0.1.el7_6
  • C
Arbitrary Code Injection

<0:60.8.0-1.0.1.el7_6
  • C
Improper Encoding or Escaping of Output

<0:60.8.0-1.0.1.el7_6
  • C
Use After Free

<0:60.8.0-1.0.1.el7_6
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.7.2-1.0.1.el7_6
  • C
Improper Input Validation

<0:60.7.2-1.0.1.el7_6
  • C
CVE-2019-11730

<0:60.8.0-1.0.1.el7_6
  • C
Out-of-bounds Read

<0:60.7.0-1.0.1.el7_6
  • C
Origin Validation Error

<0:60.7.0-1.0.1.el7_6
  • C
Information Exposure

<0:60.7.0-1.0.1.el7_6
  • C
Use After Free

<0:60.7.0-1.0.1.el7_6
  • C
Out-of-bounds Write

<0:60.7.0-1.0.1.el7_6
  • C
Use After Free

<0:60.7.0-1.0.1.el7_6
  • C
Use After Free

<0:60.7.0-1.0.1.el7_6
  • C
Origin Validation Error

<0:60.7.0-1.0.1.el7_6
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.7.0-1.0.1.el7_6
  • C
Use After Free

<0:60.7.0-1.0.1.el7_6
  • C
Improper Input Validation

<0:60.7.0-1.0.1.el7_6
  • C
Out-of-bounds Write

<0:60.7.0-1.0.1.el7_6
  • C
Out-of-bounds Write

<0:60.6.0-3.0.1.el7_6
  • C
Out-of-bounds Write

<0:60.6.0-3.0.1.el7_6
  • C
Improper Authentication

<0:60.5.0-2.0.1.el7
  • C
CVE-2018-18506

<0:60.6.0-3.0.1.el7_6
  • C
Out-of-Bounds

<0:60.6.1-1.0.1.el7_6
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.6.1-1.0.1.el7_6
  • C
Out-of-Bounds

<0:60.6.0-3.0.1.el7_6
  • C
Reachable Assertion

<0:60.6.0-3.0.1.el7_6
  • C
Use After Free

<0:60.6.0-3.0.1.el7_6
  • H
Out-of-bounds Write

<0:60.5.1-1.0.1.el7_6
  • C
Use After Free

<0:60.6.0-3.0.1.el7_6
  • C
Use After Free

<0:60.5.0-2.0.1.el7
  • C
Out-of-Bounds

<0:60.5.0-2.0.1.el7
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.6.0-3.0.1.el7_6
  • H
Integer Overflow or Wraparound

<0:60.5.1-1.0.1.el7_6
  • C
Out-of-bounds Read

<0:60.4.0-1.0.1.el7
  • C
Out-of-Bounds

<0:60.4.0-1.0.1.el7
  • C
Integer Overflow or Wraparound

<0:60.4.0-1.0.1.el7
  • C
Origin Validation Error

<0:60.4.0-1.0.1.el7
  • C
Out-of-Bounds

<0:60.4.0-1.0.1.el7
  • C
Use After Free

<0:60.4.0-1.0.1.el7
  • C
Incorrect Permission Assignment for Critical Resource

<0:60.3.0-1.0.1.el7_5
  • C
CVE-2018-12395

<0:60.3.0-1.0.1.el7_5
  • C
Out-of-bounds Write

<0:60.1.0-4.0.1.el7_5
  • M
Improper Input Validation

<0:60.2.1-1.0.1.el7_5
  • M
Insufficiently Protected Credentials

<0:60.2.1-1.0.1.el7_5
  • C
Information Exposure

<0:60.1.0-4.0.1.el7_5
  • C
Improper Input Validation

<0:60.1.0-4.0.1.el7_5
  • C
CVE-2018-5168

<0:52.8.0-1.0.1.el7_5
  • H
Use After Free

<0:52.7.3-1.0.1.el7_5
  • C
CVE-2018-12392

<0:60.3.0-1.0.1.el7_5
  • C
Information Exposure

<0:60.3.0-1.0.1.el7_5
  • C
Use After Free

<0:60.2.0-1.0.1.el7_5
  • C
Out-of-Bounds

<0:60.3.0-1.0.1.el7_5
  • C
Integer Overflow or Wraparound

<0:60.3.0-1.0.1.el7_5
  • C
Out-of-Bounds

<0:60.3.0-1.0.1.el7_5
  • C
Improper Input Validation

<0:60.2.2-1.0.1.el7_5
  • C
Incorrect Type Conversion or Cast

<0:60.2.2-1.0.1.el7_5
  • C
Information Exposure

<0:60.2.0-1.0.1.el7_5
  • C
Out-of-Bounds

<0:60.2.0-1.0.1.el7_5
  • C
Out-of-bounds Write

<0:60.2.0-1.0.1.el7_5
  • C
Use After Free

<0:60.2.0-1.0.1.el7_5
  • C
Use After Free

<0:52.8.0-1.0.1.el7_5
  • C
Out-of-bounds Read

<0:60.1.0-4.0.1.el7_5
  • C
Integer Overflow or Wraparound

<0:60.1.0-4.0.1.el7_5
  • C
Use After Free

<0:60.1.0-4.0.1.el7_5
  • C
Out-of-Bounds

<0:60.1.0-4.0.1.el7_5
  • C
Improper Input Validation

<0:60.1.0-4.0.1.el7_5
  • C
Cross-site Request Forgery (CSRF)

<0:60.1.0-4.0.1.el7_5
  • C
Use After Free

<0:60.1.0-4.0.1.el7_5
  • C
Out-of-Bounds

<0:60.1.0-4.0.1.el7_5
  • C
Out-of-Bounds

<0:52.8.0-1.0.1.el7_5
  • C
Out-of-Bounds

<0:52.8.0-1.0.1.el7_5
  • C
Information Exposure

<0:52.8.0-1.0.1.el7_5
  • C
Use After Free

<0:52.8.0-1.0.1.el7_5
  • C
Out-of-Bounds

<0:52.8.0-1.0.1.el7_5
  • C
Integer Overflow or Wraparound

<0:52.8.0-1.0.1.el7_5
  • C
Arbitrary Code Injection

<0:52.8.0-1.0.1.el7_5
  • C
Information Exposure

<0:52.7.0-1.0.1.el7_4
  • C
Use After Free

<0:52.6.0-1.0.1.el7_4
  • C
Improper Input Validation

<0:52.7.0-1.0.1.el7_4
  • C
Integer Overflow or Wraparound

<0:52.7.0-1.0.1.el7_4
  • C
Out-of-Bounds

<0:52.7.0-1.0.1.el7_4
  • C
Out-of-bounds Write

<0:52.7.0-1.0.1.el7_4
  • C
Out-of-Bounds

<0:52.7.0-1.0.1.el7_4
  • C
Out-of-Bounds

<0:52.7.0-1.0.1.el7_4
  • C
Out-of-bounds Write

<0:52.7.2-1.0.1.el7_4
  • C
Use After Free

<0:52.6.0-1.0.1.el7_4
  • C
Use After Free

<0:52.6.0-1.0.1.el7_4
  • C
Use After Free

<0:52.6.0-1.0.1.el7_4
  • C
Use After Free

<0:52.6.0-1.0.1.el7_4
  • C
Use After Free

<0:52.6.0-1.0.1.el7_4
  • C
Use After Free

<0:52.6.0-1.0.1.el7_4
  • C
CVE-2018-5117

<0:52.6.0-1.0.1.el7_4
  • C
Use After Free

<0:52.6.0-1.0.1.el7_4
  • C
Integer Overflow or Wraparound

<0:52.6.0-1.0.1.el7_4
  • C
Out-of-Bounds

<0:52.6.0-1.0.1.el7_4
  • H
Information Exposure

<0:52.5.1-1.0.1.el7_4
  • C
Use After Free

<0:52.5.0-1.0.1.el7_4
  • C
Out-of-Bounds

<0:52.5.0-1.0.1.el7_4
  • C
CVE-2017-7830

<0:52.5.0-1.0.1.el7_4
  • C
Use After Free

<0:52.4.0-1.0.1.el7_4
  • C
Use After Free

<0:52.4.0-1.0.1.el7_4
  • C
Improper Input Validation

<0:52.4.0-1.0.1.el7_4
  • C
Out-of-Bounds

<0:52.4.0-1.0.1.el7_4
  • C
Cross-site Scripting (XSS)

<0:52.4.0-1.0.1.el7_4
  • C
Use After Free

<0:52.4.0-1.0.1.el7_4
  • C
Out-of-Bounds

<0:52.4.0-1.0.1.el7_4
  • C
Use After Free

<0:52.3.0-2.0.1.el7_4
  • C
Out-of-Bounds

<0:52.3.0-2.0.1.el7_4
  • C
Improper Input Validation

<0:52.3.0-2.0.1.el7_4
  • C
Out-of-bounds Read

<0:52.3.0-2.0.1.el7_4
  • C
Use After Free

<0:52.3.0-2.0.1.el7_4
  • C
Out-of-Bounds

<0:52.3.0-2.0.1.el7_4
  • C
Improper Privilege Management

<0:52.3.0-2.0.1.el7_4
  • C
Use After Free

<0:52.3.0-2.0.1.el7_4
  • C
Improper Input Validation

<0:52.3.0-2.0.1.el7_4
  • C
Use After Free

<0:52.3.0-2.0.1.el7_4
  • C
Use After Free

<0:52.3.0-2.0.1.el7_4
  • C
Information Exposure

<0:52.3.0-2.0.1.el7_4
  • C
Out-of-Bounds

<0:52.3.0-2.0.1.el7_4
  • C
Out-of-Bounds

<0:52.3.0-2.0.1.el7_4
  • C
Arbitrary Code Injection

<0:52.3.0-2.0.1.el7_4
  • C
Use After Free

<0:52.2.0-1.0.1.el7_3
  • C
Improper Input Validation

<0:52.1.0-2.0.1.el7_3
  • C
CVE-2017-5437

<0:52.1.0-2.0.1.el7_3
  • C
CVE-2017-5455

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el7_3
  • C
Use After Free

<0:52.2.0-1.0.1.el7_3
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el7_3
  • C
Use After Free

<0:52.2.0-1.0.1.el7_3
  • C
Improper Input Validation

<0:52.2.0-1.0.1.el7_3
  • C
Use After Free

<0:52.2.0-1.0.1.el7_3
  • C
Use After Free

<0:52.2.0-1.0.1.el7_3
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el7_3
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el7_3
  • C
Use After Free

<0:52.2.0-1.0.1.el7_3
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el7_3
  • C
Out-of-bounds Read

<0:52.2.0-1.0.1.el7_3
  • C
Use After Free

<0:52.2.0-1.0.1.el7_3
  • C
CVE-2017-7775

<0:52.2.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:52.2.0-1.0.1.el7_3
  • C
Cross-site Scripting (XSS)

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Incorrect Permission Assignment for Critical Resource

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-bounds Read

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-bounds Read

<0:52.1.0-2.0.1.el7_3
  • C
Information Exposure

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-Bounds

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-bounds Write

<0:52.1.0-2.0.1.el7_3
  • C
Improper Validation of Array Index

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-bounds Write

<0:52.1.0-2.0.1.el7_3
  • C
Out-of-bounds Write

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Improper Input Validation

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.1.0-2.0.1.el7_3
  • C
Use After Free

<0:52.0-4.0.1.el7_3
  • C
Integer Overflow or Wraparound

<0:52.0-5.0.1.el7_3
  • C
Out-of-Bounds

<0:52.0-4.0.1.el7_3
  • C
DEPRECATED: Use of Uninitialized Resource

<0:52.0-4.0.1.el7_3
  • C
Information Exposure

<0:52.0-4.0.1.el7_3
  • C
Error Handling

<0:52.0-4.0.1.el7_3
  • C
Information Exposure

<0:52.0-4.0.1.el7_3
  • C
Use After Free

<0:52.0-4.0.1.el7_3
  • C
Out-of-Bounds

<0:52.0-4.0.1.el7_3
  • C
CVE-2017-5386

<0:45.7.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:52.0-4.0.1.el7_3
  • C
Out-of-Bounds

<0:45.7.0-1.0.1.el7_3
  • C
Use After Free

<0:45.7.0-1.0.1.el7_3
  • C
Use After Free

<0:45.7.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:45.7.0-1.0.1.el7_3
  • C
Information Exposure

<0:45.7.0-1.0.1.el7_3
  • C
CVE-2017-5390

<0:45.7.0-1.0.1.el7_3
  • C
Use After Free

<0:45.7.0-1.0.1.el7_3
  • C
Improper Input Validation

<0:45.7.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:45.5.0-1.0.1.el7_3
  • C
Use After Free

<0:45.6.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:45.6.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:45.5.0-1.0.1.el7_3
  • C
Information Exposure

<0:45.6.0-1.0.1.el7_3
  • C
Integer Overflow or Wraparound

<0:45.4.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.4.0-1.0.1.el7_2
  • C
Security Features

<0:45.6.0-1.0.1.el7_3
  • C
Origin Validation Error

<0:45.6.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:45.6.0-1.0.1.el7_3
  • C
Improper Access Control

<0:45.6.0-1.0.1.el7_3
  • C
Use After Free

<0:45.5.1-1.0.1.el7_3
  • C
Use After Free

<0:45.6.0-1.0.1.el7_3
  • C
Security Features

<0:45.6.0-1.0.1.el7_3
  • C
Improper Input Validation

<0:45.6.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:45.5.0-1.0.1.el7_3
  • C
Improper Certificate Validation

<0:45.5.0-1.0.1.el7_3
  • C
Integer Overflow or Wraparound

<0:45.5.0-1.0.1.el7_3
  • C
Improper Input Validation

<0:45.5.0-1.0.1.el7_3
  • C
Out-of-Bounds

<0:45.2.0-1.0.1.el7_2
  • C
Security Features

<0:45.2.0-1.0.1.el7_2
  • C
Use After Free

<0:45.4.0-1.0.1.el7_2
  • C
Use After Free

<0:45.4.0-1.0.1.el7_2
  • C
Improper Input Validation

<0:45.4.0-1.0.1.el7_2
  • C
Use After Free

<0:45.4.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.4.0-1.0.1.el7_2
  • C
Improper Input Validation

<0:45.4.0-1.0.1.el7_2
  • C
Use After Free

<0:45.4.0-1.0.1.el7_2
  • C
Information Exposure

<0:45.4.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.4.0-1.0.1.el7_2
  • C
Use After Free

<0:45.4.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el7_2
  • C
Information Exposure

<0:45.3.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el7_2
  • C
Information Exposure

<0:45.3.0-1.0.1.el7_2
  • C
Use After Free

<0:45.3.0-1.0.1.el7_2
  • C
Use After Free

<0:45.3.0-1.0.1.el7_2
  • C
Use After Free

<0:45.3.0-1.0.1.el7_2
  • C
Use After Free

<0:45.3.0-1.0.1.el7_2
  • C
Incorrect Type Conversion or Cast

<0:45.3.0-1.0.1.el7_2
  • C
Cross-site Scripting (XSS)

<0:45.3.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.2.0-1.0.1.el7_2
  • C
CVE-2016-2828

<0:45.2.0-1.0.1.el7_2
  • C
CVE-2016-2821

<0:45.2.0-1.0.1.el7_2
  • C
Improper Access Control

<0:45.2.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Security Features

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
CVE-2016-1960

<0:38.7.0-1.0.1.el7_2
  • C
Improper Data Handling

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.6.1-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.6.1-1.0.1.el7_2
  • C
Security Features

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
Improper Data Handling

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.6.0-1.0.1.el7_2
  • C
CVE-2016-1962

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.6.0-1.0.1.el7_2
  • C
CVE-2016-1973

<0:38.7.0-1.0.1.el7_2
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el7_2
  • C
CVE-2016-1964

<0:38.7.0-1.0.1.el7_2
  • C
Access Restriction Bypass

<0:38.7.0-1.0.1.el7_2
  • C
CVE-2016-1961

<0:38.7.0-1.0.1.el7_2
  • C
CVE-2016-1523

<0:38.6.1-1.0.1.el7_2
  • C
CVE-2016-1966

<0:38.7.0-1.0.1.el7_2
  • C
Numeric Errors

<0:38.5.0-3.0.1.el7_2
  • C
Security Features

<0:38.4.0-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.5.0-3.0.1.el7_2
  • C
CVE-2015-7210

<0:38.5.0-3.0.1.el7_2
  • C
Numeric Errors

<0:38.5.0-3.0.1.el7_2
  • C
Numeric Errors

<0:38.5.0-3.0.1.el7_2
  • C
Information Exposure

<0:38.5.0-3.0.1.el7_2
  • C
Numeric Errors

<0:38.5.0-3.0.1.el7_2
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el7_1
  • C
Access Restriction Bypass

<0:38.4.0-1.0.1.el7_1
  • C
Security Features

<0:38.4.0-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el7_1
  • C
Code

<0:38.4.0-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el7_1
  • C
Race Condition

<0:38.3.0-2.0.1.el7_1
  • C
CVE-2015-4497

<0:38.2.1-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el7_1
  • C
Information Exposure

<0:38.2.0-4.0.1.el7_1
  • H
CVE-2015-4495

<0:38.1.1-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.3.0-2.0.1.el7_1
  • C
CVE-2015-4509

<0:38.3.0-2.0.1.el7_1
  • C
Security Features

<0:38.2.1-1.0.1.el7_1
  • C
CVE-2015-2728

<0:38.1.0-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el7_1
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el7_1
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el7_1
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el7_1
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el7_1
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el7_1
  • C
Numeric Errors

<0:38.2.0-4.0.1.el7_1
  • C
Numeric Errors

<0:38.2.0-4.0.1.el7_1
  • C
CVE-2015-4492

<0:38.2.0-4.0.1.el7_1
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el7_1
  • C
Numeric Errors

<0:38.2.0-4.0.1.el7_1
  • C
CVE-2015-4488

<0:38.2.0-4.0.1.el7_1
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el7_1
  • C
Cryptographic Issues

<0:38.1.0-1.0.1.el7_1
  • C
Improper Input Validation

<0:38.1.0-1.0.1.el7_1
  • C
Code

<0:38.1.0-1.0.1.el7_1
  • C
CVE-2015-2722

<0:38.1.0-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el7_1
  • C
Code

<0:38.1.0-1.0.1.el7_1
  • C
Code

<0:38.1.0-1.0.1.el7_1
  • C
Code

<0:38.1.0-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el7_1
  • C
Code

<0:38.1.0-1.0.1.el7_1
  • C
CVE-2015-2731

<0:38.1.0-1.0.1.el7_1
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el7_1
  • C
Code

<0:38.1.0-1.0.1.el7_1
  • C
CVE-2015-2733

<0:38.1.0-1.0.1.el7_1
  • C
CVE-2015-2713

<0:38.0-3.0.1.el7_1
  • C
CVE-2015-2708

<0:38.0-3.0.1.el7_1
  • C
CVE-2015-0797

<0:38.0-3.0.1.el7_1
  • C
Out-of-Bounds

<0:38.0-3.0.1.el7_1
  • C
Out-of-Bounds

<0:38.0-3.0.1.el7_1
  • C
CVE-2015-0813

<0:31.6.0-2.0.1.el7_1
  • C
Code

<0:31.5.3-3.0.1.el7_1
  • C
CVE-2015-0815

<0:31.6.0-2.0.1.el7_1
  • C
Access Restriction Bypass

<0:31.5.3-3.0.1.el7_1
  • C
Cross-site Request Forgery (CSRF)

<0:31.6.0-2.0.1.el7_1
  • C
Access Restriction Bypass

<0:31.6.0-2.0.1.el7_1
  • C
Access Restriction Bypass

<0:31.6.0-2.0.1.el7_1
  • C
Out-of-Bounds

<0:31.5.0-2.0.1.el7_0
  • C
CVE-2015-0831

<0:31.5.0-2.0.1.el7_0
  • C
CVE-2015-0836

<0:31.5.0-2.0.1.el7_0
  • C
Information Exposure

<0:31.5.0-2.0.1.el7_0
  • C
CVE-2014-8634

<0:31.4.0-1.0.1.el7_0
  • C
CVE-2014-8641

<0:31.4.0-1.0.1.el7_0
  • C
CVE-2014-8639

<0:31.4.0-1.0.1.el7_0
  • C
Cross-site Request Forgery (CSRF)

<0:31.4.0-1.0.1.el7_0
  • C
Improper Input Validation

<0:31.3.0-3.0.1.el7_0
  • C
Improper Input Validation

<0:31.3.0-3.0.1.el7_0
  • C
Improper Input Validation

<0:31.3.0-3.0.1.el7_0
  • C
Out-of-Bounds

<0:31.3.0-3.0.1.el7_0
  • C
CVE-2014-1592

<0:31.3.0-3.0.1.el7_0
  • C
CVE-2014-1574

<0:31.2.0-3.0.1.el7_0
  • C
CVE-2014-1583

<0:31.2.0-3.0.1.el7_0
  • C
Out-of-Bounds

<0:31.2.0-3.0.1.el7_0
  • C
CVE-2014-1577

<0:31.2.0-3.0.1.el7_0
  • C
Out-of-Bounds

<0:31.2.0-3.0.1.el7_0
  • C
CVE-2014-1581

<0:31.2.0-3.0.1.el7_0
  • C
CVE-2014-1567

<0:24.8.0-1.0.1.el7_0
  • C
Out-of-Bounds

<0:24.8.0-1.0.1.el7_0
  • C
Arbitrary Code Injection

<0:24.7.0-1.0.1.el7_0
  • C
CVE-2014-1547

<0:24.7.0-1.0.1.el7_0
  • C
Arbitrary Code Injection

<0:24.7.0-1.0.1.el7_0
  • C
CVE-2014-1555

<0:24.7.0-1.0.1.el7_0
  • C
CVE-2014-1538

<0:24.6.0-1.0.1.el7_0
  • C
CVE-2014-1541

<0:24.6.0-1.0.1.el7_0
  • C
CVE-2014-1533

<0:24.6.0-1.0.1.el7_0