autocorr-pl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the autocorr-pl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Verification of Cryptographic Signature

*
  • H
Execution with Unnecessary Privileges

<1:5.3.6.1-26.el7_9
  • M
Improper Access Control

<1:5.3.6.1-24.el7
  • M
Inappropriate Encoding for Output Context

<1:5.3.6.1-24.el7
  • M
Directory Traversal

<1:5.3.6.1-24.el7
  • M
Arbitrary Code Injection

<1:5.3.6.1-24.el7
  • M
Arbitrary Code Injection

<1:5.3.6.1-24.el7
  • M
Information Exposure

<1:5.3.6.1-24.el7
  • M
Improper Input Validation

<1:5.3.6.1-24.el7
  • L
Product UI does not Warn User of Unsafe Actions

<1:5.3.6.1-21.el7
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Input Validation

*
  • H
Execution with Unnecessary Privileges

<1:5.3.6.1-26.el7_9
  • H
Execution with Unnecessary Privileges

*
  • M
Improper Input Validation

*
  • M
CVE-2023-2255

*
  • M
Improper Validation of Array Index

*
  • M
Uncontrolled Search Path Element

*
  • M
Arbitrary Argument Injection

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-15.el7_4
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Information Exposure

<1:5.0.6.2-5.el7_3.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Integer Overflow or Wraparound

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Out-of-bounds Write

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7_2.1
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Product UI does not Warn User of Unsafe Actions

<1:4.2.6.3-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Validation of Array Index

<1:4.3.7.2-5.el7
  • M
Improper Access Control

<1:5.3.6.1-24.el7
  • M
Inappropriate Encoding for Output Context

<1:5.3.6.1-24.el7
  • M
Directory Traversal

<1:5.3.6.1-24.el7
  • M
Arbitrary Code Injection

<1:5.3.6.1-24.el7
  • M
Arbitrary Code Injection

<1:5.3.6.1-24.el7
  • M
Information Exposure

<1:5.3.6.1-24.el7
  • M
Improper Input Validation

<1:5.3.6.1-24.el7
  • L
Improper Access Control

*
  • L
Information Exposure

*
  • L
Product UI does not Warn User of Unsafe Actions

<1:5.3.6.1-21.el7
  • L
Product UI does not Warn User of Unsafe Actions

<1:5.3.6.1-21.el7
  • L
Product UI does not Warn User of Unsafe Actions

<1:5.3.6.1-21.el7
  • L
Product UI does not Warn User of Unsafe Actions

<1:5.3.6.1-21.el7
  • L
Product UI does not Warn User of Unsafe Actions

<1:5.3.6.1-21.el7
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Information Exposure

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Out-of-bounds Write

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Integer Overflow or Wraparound

<1:5.3.6.1-19.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

<1:5.0.6.2-14.el7
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Out-of-Bounds

<1:5.0.6.2-3.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Use After Free

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • M
Information Exposure

<1:4.2.6.3-5.el7
  • L
Improper Input Validation

*