unbound-libs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the unbound-libs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Unchecked Input for Loop Condition

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Resource Exhaustion

*
  • H
Incorrect Default Permissions

<0:1.7.3-12.el8_2.1
  • H
Resource Exhaustion

<0:1.7.3-12.el8_2.1
  • H
Resource Exhaustion

<0:1.7.3-12.el8_2.1
  • H
Incorrect Default Permissions

<0:1.7.3-12.el8_2.1
  • H
Resource Exhaustion

<0:1.7.3-12.el8_2.1
  • H
Resource Exhaustion

<0:1.7.3-12.el8_2.1
  • H
Incorrect Default Permissions

<0:1.7.3-12.el8_2.1
  • H
Resource Exhaustion

<0:1.7.3-12.el8_2.1
  • H
Resource Exhaustion

<0:1.7.3-12.el8_2.1
  • H
Incorrect Default Permissions

<0:1.7.3-15.el8_4.1
  • H
Resource Exhaustion

<0:1.7.3-15.el8_4.1
  • H
Resource Exhaustion

<0:1.7.3-15.el8_4.1
  • H
Incorrect Default Permissions

<0:1.7.3-15.el8_4.1
  • H
Resource Exhaustion

<0:1.7.3-15.el8_4.1
  • H
Resource Exhaustion

<0:1.7.3-15.el8_4.1
  • H
Incorrect Default Permissions

<0:1.7.3-15.el8_4.1
  • H
Resource Exhaustion

<0:1.7.3-15.el8_4.1
  • H
Resource Exhaustion

<0:1.7.3-15.el8_4.1
  • M
Resource Exhaustion

<0:1.7.3-17.el8_6.5
  • M
Insufficient Session Expiration

<0:1.7.3-17.el8_6.5
  • M
Insufficient Session Expiration

<0:1.7.3-17.el8_6.5
  • M
Resource Exhaustion

<0:1.7.3-17.el8_6.5
  • M
Insufficient Session Expiration

<0:1.7.3-17.el8_6.5
  • M
Insufficient Session Expiration

<0:1.7.3-17.el8_6.5
  • M
Resource Exhaustion

<0:1.7.3-17.el8_6.5
  • M
Insufficient Session Expiration

<0:1.7.3-17.el8_6.5
  • M
Insufficient Session Expiration

<0:1.7.3-17.el8_6.5
  • M
Resource Exhaustion

<0:1.7.3-17.el8_6.5
  • M
Insufficient Session Expiration

<0:1.7.3-17.el8_6.5
  • M
Insufficient Session Expiration

<0:1.7.3-17.el8_6.5
  • H
Incorrect Default Permissions

<0:1.16.2-5.el8_8.4
  • H
Incorrect Default Permissions

<0:1.16.2-5.el8_8.4
  • H
Incorrect Default Permissions

<0:1.16.2-5.el8_8.4
  • H
Incorrect Default Permissions

<0:1.16.2-5.el8_8.4
  • H
Incorrect Default Permissions

<0:1.7.3-17.el8_6.4
  • H
Resource Exhaustion

<0:1.7.3-17.el8_6.4
  • H
Resource Exhaustion

<0:1.7.3-17.el8_6.4
  • H
Incorrect Default Permissions

<0:1.7.3-17.el8_6.4
  • H
Resource Exhaustion

<0:1.7.3-17.el8_6.4
  • H
Resource Exhaustion

<0:1.7.3-17.el8_6.4
  • H
Incorrect Default Permissions

<0:1.7.3-17.el8_6.4
  • H
Resource Exhaustion

<0:1.7.3-17.el8_6.4
  • H
Resource Exhaustion

<0:1.7.3-17.el8_6.4
  • H
Incorrect Default Permissions

<0:1.7.3-17.el8_6.4
  • H
Resource Exhaustion

<0:1.7.3-17.el8_6.4
  • H
Resource Exhaustion

<0:1.7.3-17.el8_6.4
  • H
Resource Exhaustion

<0:1.16.2-5.el8_8.1
  • H
Resource Exhaustion

<0:1.16.2-5.el8_8.1
  • H
Resource Exhaustion

<0:1.16.2-5.el8_8.1
  • H
Resource Exhaustion

<0:1.16.2-5.el8_8.1
  • H
Resource Exhaustion

<0:1.16.2-5.el8_8.1
  • H
Resource Exhaustion

<0:1.16.2-5.el8_8.1
  • H
Resource Exhaustion

<0:1.16.2-5.el8_8.1
  • H
Resource Exhaustion

<0:1.16.2-5.el8_8.1
  • H
Incorrect Default Permissions

<0:1.16.2-5.el8_9.6
  • H
Resource Exhaustion

<0:1.16.2-5.el8_9.2
  • H
Resource Exhaustion

<0:1.16.2-5.el8_9.2
  • M
Integer Overflow or Wraparound

<0:1.7.3-17.el8_6.1
  • M
Integer Overflow or Wraparound

<0:1.7.3-17.el8_6.1
  • M
Integer Overflow or Wraparound

<0:1.7.3-17.el8_6.1
  • M
Integer Overflow or Wraparound

<0:1.7.3-17.el8_6.1
  • M
Integer Overflow or Wraparound

<0:1.16.2-2.el8
  • M
Integer Overflow or Wraparound

<0:1.16.2-2.el8
  • M
Integer Overflow or Wraparound

<0:1.16.2-2.el8
  • M
Integer Overflow or Wraparound

<0:1.16.2-2.el8
  • M
Resource Exhaustion

<0:1.16.2-5.el8
  • M
Resource Exhaustion

<0:1.16.2-5.el8
  • M
Resource Exhaustion

<0:1.16.2-5.el8
  • M
Resource Exhaustion

<0:1.16.2-5.el8
  • M
Resource Exhaustion

<0:1.16.2-5.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • M
Insufficient Session Expiration

<0:1.16.2-2.el8
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-9.el8_0
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-9.el8_1
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-9.el8_1
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-9.el8_1
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-9.el8_0
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-9.el8_1
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • H
Improper Input Validation

<0:1.7.3-11.el8_2
  • M
Link Following

<0:1.7.3-12.el8_2
  • M
Link Following

<0:1.7.3-12.el8_2
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-12.el8_2
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-12.el8_2
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Link Following

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-12.el8_2
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-12.el8_2
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-12.el8_2
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-12.el8_2
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-12.el8_2
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Reachable Assertion

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-12.el8_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-12.el8_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-12.el8_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-12.el8_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-12.el8_2
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-12.el8_2
  • M
Out-of-bounds Write

<0:1.7.3-15.el8
  • M
Out-of-bounds Write

<0:1.7.3-12.el8_2
  • M
Out-of-bounds Write

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-15.el8
  • M
Integer Overflow or Wraparound

<0:1.7.3-12.el8_2
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
OS Command Injection

<0:1.7.3-10.el8
  • M
Integer Overflow or Wraparound

<0:1.16.2-2.el8
  • L
Untrusted Pointer Dereference

*