thunderbird-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the thunderbird-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Execution with Unnecessary Privileges

<0:38.3.0-1.el5_11
  • C
Out-of-bounds Write

<0:24.3.0-2.el5_10
  • M
Resource Management Errors

<0:2.0.0.24-8.el5
  • C
Access Restriction Bypass

<0:2.0.0.16-1.el5
  • H
Use After Free

<0:45.5.1-1.el5_11
  • C
CVE-2013-0783

<0:17.0.3-1.el5_9
  • H
Use After Free

<0:31.6.0-1.el5_11
  • M
Improperly Implemented Security Check for Standard

<0:31.6.0-1.el5_11
  • C
Use After Free

<0:24.4.0-1.el5_10
  • C
Resource Management Errors

<0:2.0.0.21-1.el5
  • C
Resource Management Errors

<0:10.0.6-1.el5_8
  • C
Code

<0:38.4.0-1.el5_11
  • L
CVE-2007-2871

<0:1.5.0.12-1.el5
  • L
Improper Input Validation

<0:1.5.0.12-1.el5
  • L
Out-of-Bounds

<0:1.5.0.12-1.el5
  • M
CVE-2007-1558

<0:1.5.0.12-1.el5
  • L
CVE-2007-2869

<0:1.5.0.12-1.el5
  • M
Cross-site Request Forgery (CSRF)

<0:1.5.0.12-7.el5
  • C
CVE-2007-5959

<0:1.5.0.12-7.el5
  • M
Cross-site Scripting (XSS)

<0:1.5.0.12-7.el5
  • C
Resource Management Errors

<0:1.5.0.12-8.el5
  • C
Out-of-Bounds

<0:1.5.0.12-8.el5
  • C
Resource Management Errors

<0:1.5.0.12-8.el5
  • M
CVE-2008-0591

<0:1.5.0.12-8.el5
  • C
Cross-site Scripting (XSS)

<0:1.5.0.12-8.el5
  • M
Directory Traversal

<0:1.5.0.12-8.el5
  • L
CVE-2008-0592

<0:1.5.0.12-8.el5
  • M
Information Exposure

<0:1.5.0.12-8.el5
  • L
Information Exposure

<0:1.5.0.12-8.el5
  • C
Resource Management Errors

<0:1.5.0.12-8.el5
  • C
Arbitrary Code Injection

<0:1.5.0.12-11.el5_1
  • M
Cross-site Scripting (XSS)

<0:1.5.0.12-11.el5_1
  • C
CVE-2008-1235

<0:1.5.0.12-11.el5_1
  • C
Resource Management Errors

<0:1.5.0.12-12.el5_1
  • C
Resource Management Errors

<0:1.5.0.12-11.el5_1
  • M
Link Following

<0:1.5.0.12-11.el5_1
  • C
Resource Management Errors

<0:1.5.0.12-11.el5_1
  • C
Numeric Errors

<0:2.0.0.16-1.el5
  • M
Improper Authentication

<0:1.5.0.12-11.el5_1
  • C
Access Restriction Bypass

<0:2.0.0.16-1.el5
  • M
Access Restriction Bypass

<0:2.0.0.16-1.el5
  • M
Memory Leak

<0:2.0.0.16-1.el5
  • M
Cross-site Scripting (XSS)

<0:2.0.0.16-1.el5
  • C
Resource Management Errors

<0:2.0.0.16-1.el5
  • C
Resource Management Errors

<0:2.0.0.16-1.el5
  • M
Cross-site Scripting (XSS)

<0:2.0.0.16-1.el5
  • C
Improper Authentication

<0:2.0.0.16-1.el5
  • M
Improper Input Validation

<0:2.0.0.16-1.el5
  • M
Improper Input Validation

<0:2.0.0.16-1.el5
  • C
Resource Management Errors

<0:2.0.0.16-1.el5
  • C
Stack-based Buffer Overflow

<0:2.0.0.17-1.el5
  • M
Access Restriction Bypass

<0:2.0.0.17-1.el5
  • C
Numeric Errors

<0:2.0.0.17-1.el5
  • M
Out-of-Bounds

<0:2.0.0.17-1.el5
  • C
Access Restriction Bypass

<0:2.0.0.17-1.el5
  • C
Resource Management Errors

<0:2.0.0.17-1.el5
  • C
Access Restriction Bypass

<0:2.0.0.17-1.el5
  • M
Cross-site Scripting (XSS)

<0:2.0.0.17-1.el5
  • M
Directory Traversal

<0:2.0.0.17-1.el5
  • M
Directory Traversal

<0:2.0.0.17-1.el5
  • C
Access Restriction Bypass

<0:2.0.0.17-1.el5
  • M
Cross-site Scripting (XSS)

<0:2.0.0.17-1.el5
  • L
XML Injection

<0:2.0.0.18-1.el5
  • C
Improper Input Validation

<0:2.0.0.18-1.el5
  • C
Race Condition

<0:2.0.0.18-1.el5
  • C
Resource Management Errors

<0:2.0.0.18-1.el5
  • M
Improper Authentication

<0:2.0.0.18-1.el5
  • C
Resource Management Errors

<0:2.0.0.18-1.el5
  • C
Numeric Errors

<0:2.0.0.18-1.el5
  • M
Access Restriction Bypass

<0:2.0.0.19-1.el5_2
  • C
Resource Management Errors

<0:2.0.0.19-1.el5_2
  • M
Information Exposure

<0:2.0.0.18-1.el5
  • C
Access Restriction Bypass

<0:2.0.0.19-1.el5_2
  • L
Improper Input Validation

<0:2.0.0.19-1.el5_2
  • C
CVE-2008-5501

<0:2.0.0.19-1.el5_2
  • M
Information Exposure

<0:2.0.0.19-1.el5_2
  • M
CVE-2008-5503

<0:2.0.0.19-1.el5_2
  • C
Cross-site Scripting (XSS)

<0:2.0.0.19-1.el5_2
  • C
Resource Management Errors

<0:2.0.0.19-1.el5_2
  • C
Resource Management Errors

<0:2.0.0.21-1.el5
  • C
Cross-site Scripting (XSS)

<0:2.0.0.19-1.el5_2
  • C
Resource Management Errors

<0:2.0.0.21-1.el5
  • C
Resource Management Errors

<0:2.0.0.21-1.el5
  • M
Access Restriction Bypass

<0:2.0.0.21-1.el5
  • M
Information Exposure

<0:2.0.0.21-1.el5
  • C
Resource Management Errors

<0:2.0.0.21-1.el5
  • M
Configuration

<0:2.0.0.22-2.el5_3
  • M
Configuration

<0:2.0.0.22-2.el5_3
  • C
Configuration

<0:2.0.0.22-2.el5_3
  • M
Improper Authentication

<0:2.0.0.22-2.el5_3
  • H
Improper Input Validation

<0:2.0.0.22-2.el5_3
  • L
Cross-site Scripting (XSS)

<0:2.0.0.22-2.el5_3
  • C
Resource Management Errors

<0:2.0.0.22-2.el5_3
  • C
Arbitrary Code Injection

<0:2.0.0.22-2.el5_3
  • C
Arbitrary Code Injection

<0:2.0.0.22-2.el5_3
  • C
Arbitrary Code Injection

<0:2.0.0.22-2.el5_3
  • C
Resource Management Errors

<0:2.0.0.24-2.el5_4
  • C
Numeric Errors

<0:2.0.0.24-2.el5_4
  • H
CVE-2009-2210

<0:2.0.0.22-2.el5_3
  • C
Resource Management Errors

<0:2.0.0.24-2.el5_4
  • L
Improper Input Validation

<0:2.0.0.24-2.el5_4
  • C
CVE-2009-3072

<0:2.0.0.24-2.el5_4
  • C
Arbitrary Code Injection

<0:2.0.0.24-2.el5_4
  • M
CVE-2009-3274

<0:2.0.0.24-2.el5_4
  • C
CVE-2009-3075

<0:2.0.0.24-2.el5_4
  • M
CVE-2009-3076

<0:2.0.0.24-2.el5_4
  • C
CVE-2009-3380

<0:2.0.0.24-2.el5_4
  • L
Configuration

<0:2.0.0.24-2.el5_4
  • C
Integer Overflow or Wraparound

<0:2.0.0.24-2.el5_4
  • C
Out-of-Bounds

<0:2.0.0.24-2.el5_4
  • C
CVE-2009-3979

<0:2.0.0.24-2.el5_4
  • C
Arbitrary Code Injection

<0:2.0.0.24-2.el5_4
  • C
CVE-2010-0159

<0:2.0.0.24-2.el5_4
  • L
CVE-2010-0169

<0:2.0.0.24-2.el5_4
  • H
Cross-site Scripting (XSS)

<0:2.0.0.24-2.el5_4
  • H
CVE-2010-0163

<0:2.0.0.24-2.el5_4
  • M
Cross-site Scripting (XSS)

<0:2.0.0.24-6.el5
  • M
Information Exposure

<0:2.0.0.24-6.el5
  • M
Cross-site Scripting (XSS)

<0:2.0.0.24-8.el5
  • C
CVE-2010-3176

<0:2.0.0.24-9.el5
  • C
Out-of-Bounds

<0:2.0.0.24-10.el5_5
  • M
CVE-2010-3182

<0:2.0.0.24-9.el5
  • C
Use After Free

<0:2.0.0.24-9.el5
  • C
Out-of-Bounds

<0:2.0.0.24-13.el5_5
  • C
Numeric Errors

<0:2.0.0.24-13.el5_5
  • C
Integer Overflow or Wraparound

<0:2.0.0.24-13.el5_5
  • C
CVE-2011-0053

<0:2.0.0.24-14.el5_6
  • C
Improper Input Validation

<0:2.0.0.24-14.el5_6
  • C
Integer Overflow or Wraparound

<0:2.0.0.24-17.el5_6
  • M
CVE-2011-0075

<0:2.0.0.24-17.el5_6
  • C
Improper Input Validation

<0:2.0.0.24-17.el5_6
  • C
CVE-2011-0080

<0:2.0.0.24-17.el5_6
  • M
CVE-2011-0078

<0:2.0.0.24-17.el5_6
  • C
CVE-2011-0074

<0:2.0.0.24-17.el5_6
  • C
Resource Management Errors

<0:2.0.0.24-18.el5_6
  • C
Resource Management Errors

<0:2.0.0.24-18.el5_6
  • C
Use After Free

<0:2.0.0.24-18.el5_6
  • C
CVE-2011-2376

<0:2.0.0.24-18.el5_6
  • C
CVE-2011-2374

<0:2.0.0.24-18.el5_6
  • C
CVE-2011-2364

<0:2.0.0.24-18.el5_6
  • C
CVE-2011-2365

<0:2.0.0.24-18.el5_6
  • C
Out-of-Bounds

<0:2.0.0.24-18.el5_6
  • C
Resource Management Errors

<0:2.0.0.24-18.el5_6
  • M
Access Restriction Bypass

<0:2.0.0.24-18.el5_6
  • C
CVE-2011-2982

<0:2.0.0.24-21.el5
  • C
CVE-2011-2375

<0:2.0.0.24-18.el5_6
  • C
Integer Overflow or Wraparound

<0:2.0.0.24-18.el5_6
  • C
Integer Overflow or Wraparound

<0:2.0.0.24-26.el5_7
  • C
Arbitrary Code Injection

<0:2.0.0.24-18.el5_6
  • C
Information Exposure

<0:2.0.0.24-21.el5
  • C
Cross-site Scripting (XSS)

<0:2.0.0.24-26.el5_7
  • C
Resource Management Errors

<0:2.0.0.18-1.el5
  • C
Arbitrary Code Injection

<0:1.5.0.12-1.el5
  • M
CVE-2010-3169

<0:2.0.0.24-8.el5
  • M
Out-of-Bounds

<0:2.0.0.24-8.el5
  • M
Resource Management Errors

<0:2.0.0.24-8.el5
  • C
Integer Overflow or Wraparound

<0:2.0.0.24-8.el5
  • M
CVE-2010-1200

<0:2.0.0.24-6.el5
  • M
Integer Overflow or Wraparound

<0:2.0.0.24-6.el5
  • M
Numeric Errors

<0:2.0.0.24-6.el5
  • M
Out-of-Bounds

<0:2.0.0.24-8.el5
  • M
CVE-2010-0174

<0:2.0.0.24-6.el5
  • M
Integer Overflow or Wraparound

<0:2.0.0.24-6.el5
  • M
CVE-2010-1211

<0:2.0.0.24-6.el5
  • M
Resource Management Errors

<0:2.0.0.24-6.el5
  • M
Resource Management Errors

<0:2.0.0.24-6.el5
  • M
Resource Management Errors

<0:2.0.0.24-6.el5
  • M
Use After Free

<0:2.0.0.24-6.el5
  • C
Buffer Overflow

<0:2.0.0.24-6.el5
  • M
Information Exposure

<0:45.8.0-1.el5_11
  • M
Information Exposure

<0:45.8.0-1.el5_11
  • L
DEPRECATED: Use of Uninitialized Resource

<0:45.8.0-1.el5_11
  • M
Improper Input Validation

<0:45.7.0-1.el5_11
  • M
Security Features

<0:45.6.0-1.el5_11
  • C
CVE-2012-0442

<0:2.0.0.24-28.el5_7
  • L
Information Exposure

<0:2.0.0.24-28.el5_7
  • M
Cross-site Scripting (XSS)

<0:2.0.0.24-27.el5_7
  • H
Out-of-Bounds

<0:45.7.0-1.el5_11
  • H
Out-of-Bounds

<0:45.7.0-1.el5_11
  • H
Use After Free

<0:45.7.0-1.el5_11
  • H
Out-of-Bounds

<0:45.5.0-1.el5_11
  • M
Use After Free

<0:45.7.0-1.el5_11
  • M
Use After Free

<0:45.7.0-1.el5_11
  • C
Use After Free

<0:45.8.0-1.el5_11
  • M
Origin Validation Error

<0:45.6.0-1.el5_11
  • M
Information Exposure

<0:45.7.0-1.el5_11
  • M
CVE-2017-5390

<0:45.7.0-1.el5_11
  • C
Use After Free

<0:45.8.0-1.el5_11
  • M
Improper Access Control

<0:45.6.0-1.el5_11
  • M
Improper Input Validation

<0:45.6.0-1.el5_11
  • C
Out-of-Bounds

<0:45.8.0-1.el5_11
  • M
Out-of-Bounds

<0:45.8.0-1.el5_11
  • M
Security Features

<0:45.6.0-1.el5_11
  • H
Out-of-Bounds

<0:45.6.0-1.el5_11
  • C
Error Handling

<0:45.8.0-1.el5_11
  • C
Out-of-Bounds

<0:45.8.0-1.el5_11
  • C
CVE-2011-3101

<0:10.0.5-2.el5_8
  • C
CVE-2012-1938

<0:10.0.5-2.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.8-1.el5_8
  • M
Out-of-bounds Read

<0:24.2.0-2.el5_10
  • H
Arbitrary Code Injection

<0:24.2.0-2.el5_10
  • M
Cross-site Scripting (XSS)

<0:24.2.0-2.el5_10
  • H
Use After Free

<0:24.2.0-2.el5_10
  • H
Use After Free

<0:24.2.0-2.el5_10
  • M
CVE-2014-1481

<0:24.3.0-2.el5_10
  • H
Use After Free

<0:24.2.0-2.el5_10
  • H
CVE-2013-5609

<0:24.2.0-2.el5_10
  • L
Improper Restriction of Rendered UI Layers or Frames

<0:24.2.0-2.el5_10
  • C
Use After Free

<0:24.3.0-2.el5_10
  • M
Information Exposure

<0:24.3.0-2.el5_10
  • M
Cross-site Scripting (XSS)

<0:24.2.0-2.el5_10
  • M
CVE-2014-1479

<0:24.3.0-2.el5_10
  • C
Out-of-Bounds

<0:24.4.0-1.el5_10
  • M
Out-of-bounds Read

<0:24.4.0-1.el5_10
  • C
Out-of-bounds Write

<0:24.4.0-1.el5_10
  • C
CVE-2014-1477

<0:24.3.0-2.el5_10
  • C
Out-of-bounds Read

<0:24.4.0-1.el5_10
  • M
Buffer Overflow

<0:24.4.0-1.el5_10
  • M
Information Exposure

<0:24.4.0-1.el5_10
  • M
Out-of-bounds Read

<0:24.4.0-1.el5_10
  • C
Improper Privilege Management

<0:24.4.0-1.el5_10
  • C
Use After Free

<0:24.5.0-1.el5_10
  • C
Improper Privilege Management

<0:24.4.0-1.el5_10
  • C
Improper Privilege Management

<0:24.5.0-1.el5_10
  • C
Use After Free

<0:24.5.0-1.el5_10
  • C
CVE-2014-1518

<0:24.5.0-1.el5_10
  • C
Buffer Overflow

<0:24.5.0-1.el5_10
  • M
Cross-site Scripting (XSS)

<0:24.5.0-1.el5_10
  • M
Out-of-bounds Read

<0:24.5.0-1.el5_10
  • H
Heap-based Buffer Overflow

<0:31.6.0-1.el5_11
  • M
Execution with Unnecessary Privileges

<0:31.6.0-1.el5_11
  • C
Out-of-Bounds

<0:10.0.4-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.4-1.el5_8
  • C
CVE-2012-1937

<0:10.0.5-2.el5_8
  • M
CVE-2012-0479

<0:10.0.4-1.el5_8
  • C
CVE-2012-0467

<0:10.0.4-1.el5_8
  • C
Use After Free

<0:10.0.5-2.el5_8
  • C
Use After Free

<0:10.0.4-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.4-1.el5_8
  • C
Access Restriction Bypass

<0:10.0.4-1.el5_8
  • C
CVE-2012-1948

<0:10.0.6-1.el5_8
  • C
Out-of-Bounds

<0:10.0.4-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.5-2.el5_8
  • C
Out-of-Bounds

<0:10.0.5-2.el5_8
  • C
Out-of-Bounds

<0:10.0.5-2.el5_8
  • M
Improper Input Validation

<0:10.0.6-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.4-1.el5_8
  • C
Out-of-Bounds

<0:10.0.4-1.el5_8
  • C
Out-of-Bounds

<0:10.0.6-1.el5_8
  • M
Use After Free

<0:10.0.6-1.el5_8
  • C
Out-of-Bounds

<0:10.0.5-2.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.6-1.el5_8
  • C
Out-of-Bounds

<0:10.0.5-2.el5_8
  • C
Resource Management Errors

<0:10.0.6-1.el5_8
  • M
Numeric Errors

<0:10.0.4-1.el5_8
  • C
Access Restriction Bypass

<0:10.0.6-1.el5_8
  • M
Improper Privilege Management

<0:10.0.8-1.el5_8
  • M
CVE-2012-1955

<0:10.0.6-1.el5_8
  • M
Information Exposure

<0:10.0.5-2.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Resource Management Errors

<0:10.0.6-1.el5_8
  • C
Resource Management Errors

<0:10.0.6-1.el5_8
  • C
Out-of-Bounds

<0:10.0.5-2.el5_8
  • C
Out-of-Bounds

<0:10.0.7-1.el5_8
  • M
CVE-2012-1964

<0:10.0.6-1.el5_8
  • M
Access Restriction Bypass

<0:10.0.6-1.el5_8
  • C
CVE-2013-0801

<0:17.0.6-1.el5_9
  • H
Arbitrary Code Injection

<0:10.0.7-1.el5_8
  • M
Access Restriction Bypass

<0:10.0.7-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
CVE-2013-0788

<0:17.0.5-1.el5_9
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Out-of-Bounds

<0:17.0.6-1.el5_9
  • C
CVE-2012-1967

<0:10.0.6-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:17.0.5-1.el5_9
  • C
Use After Free

<0:17.0.3-2.el5_9
  • C
Use After Free

<0:17.0.6-1.el5_9
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Resource Management Errors

<0:17.0.6-1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.el5_9
  • C
Resource Management Errors

<0:17.0.7-1.el5_9
  • C
Out-of-Bounds

<0:17.0.6-1.el5_9
  • M
Cross-site Request Forgery (CSRF)

<0:17.0.7-1.el5_9
  • C
Access Restriction Bypass

<0:17.0.5-1.el5_9
  • M
Cross-site Scripting (XSS)

<0:17.0.6-1.el5_9
  • C
CVE-2013-1682

<0:17.0.7-1.el5_9
  • C
Out-of-Bounds

<0:17.0.6-1.el5_9
  • C
Resource Management Errors

<0:17.0.7-1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.el5_9
  • M
Access Restriction Bypass

<0:17.0.8-5.el5_9
  • C
CVE-2013-1701

<0:17.0.8-5.el5_9
  • M
Improper Input Validation

<0:17.0.7-1.el5_9
  • C
Resource Management Errors

<0:17.0.7-1.el5_9
  • M
Access Restriction Bypass

<0:17.0.7-1.el5_9
  • C
Cross-site Scripting (XSS)

<0:17.0.8-5.el5_9
  • M
Access Restriction Bypass

<0:17.0.7-1.el5_9
  • M
Cross-site Scripting (XSS)

<0:17.0.8-5.el5_9
  • M
Access Restriction Bypass

<0:17.0.8-5.el5_9
  • C
Access Restriction Bypass

<0:17.0.7-1.el5_9
  • C
Improper Input Validation

<0:17.0.9-1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.el5_9
  • C
Use After Free

<0:17.0.9-1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.el5_9
  • C
CVE-2013-5590

<0:17.0.10-1.el5_10
  • M
Out-of-Bounds

<0:17.0.10-1.el5_10
  • H
Out-of-Bounds

<0:17.0.9-1.el5_9
  • M
Access Restriction Bypass

<0:17.0.8-5.el5_9
  • C
Use After Free

<0:17.0.10-1.el5_10
  • H
Out-of-Bounds

<0:17.0.9-1.el5_9
  • M
Out-of-Bounds

<0:17.0.10-1.el5_10
  • C
Out-of-Bounds

<0:17.0.9-1.el5_9
  • C
Use After Free

<0:17.0.10-1.el5_10
  • C
Use After Free

<0:24.6.0-1.el5_10
  • C
Out-of-Bounds

<0:24.6.0-1.el5_10
  • M
Access Restriction Bypass

<0:17.0.9-1.el5_9
  • C
CVE-2014-1533

<0:24.6.0-1.el5_10
  • C
Use After Free

<0:17.0.10-1.el5_10
  • C
Use After Free

<0:17.0.10-1.el5_10
  • C
Use After Free

<0:24.8.0-1.el5_10
  • C
Out-of-Bounds

<0:17.0.10-1.el5_10
  • C
CVE-2014-1547

<0:24.7.0-1.el5_10
  • C
Arbitrary Code Injection

<0:24.7.0-1.el5_10
  • M
Operation on a Resource after Expiration or Release

<0:24.7.0-1.el5_10
  • C
Out-of-Bounds

<0:24.8.0-1.el5_10
  • H
Use After Free

<0:31.5.0-1.el5_11
  • M
Use After Free

<0:24.7.0-1.el5_10
  • C
Heap-based Buffer Overflow

<0:31.4.0-1.el5_11
  • M
Out-of-Bounds

<0:31.5.0-1.el5_11
  • M
Cross-site Request Forgery (CSRF)

<0:31.4.0-1.el5_11
  • H
CVE-2015-0836

<0:31.5.0-1.el5_11
  • C
Code

<0:31.8.0-1.el5_11
  • M
Cross-site Request Forgery (CSRF)

<0:31.6.0-1.el5_11
  • M
Information Exposure

<0:31.5.0-1.el5_11
  • M
Arbitrary Argument Injection

<0:31.4.0-1.el5_11
  • H
CVE-2015-2708

<0:31.7.0-1.el5_11
  • H
Out-of-Bounds

<0:31.8.0-1.el5_11
  • C
Use After Free

<0:31.8.0-1.el5_11
  • H
Out-of-Bounds

<0:31.8.0-1.el5_11
  • H
Use After Free

<0:31.7.0-1.el5_11
  • C
Code

<0:31.8.0-1.el5_11
  • H
Out-of-Bounds

<0:31.7.0-1.el5_11
  • H
Out-of-Bounds

<0:31.7.0-1.el5_11
  • C
Code

<0:31.8.0-1.el5_11
  • C
Code

<0:31.8.0-1.el5_11
  • M
Cryptographic Issues

<0:31.8.0-1.el5_11
  • C
Code

<0:31.8.0-1.el5_11
  • C
Out-of-Bounds

<0:31.8.0-1.el5_11
  • C
Out-of-Bounds

<0:38.6.0-1.el5_11
  • H
Out-of-bounds Read

<0:38.6.0-1.el5_11
  • M
Out-of-Bounds

<0:38.7.0-1.el5_11
  • C
Heap-based Buffer Overflow

<0:38.6.0-1.el5_11
  • C
Out-of-Bounds

<0:38.6.0-1.el5_11
  • C
Out-of-Bounds

<0:31.8.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
NULL Pointer Dereference

<0:38.6.0-1.el5_11
  • M
Access Restriction Bypass

<0:38.7.0-1.el5_11
  • H
CVE-2016-1961

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
CVE-2016-1966

<0:38.7.0-1.el5_11
  • H
CVE-2016-1964

<0:38.7.0-1.el5_11
  • H
Improper Data Handling

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
CVE-2016-1960

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.8.0-1.el5_11
  • H
Improper Data Handling

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.8.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • M
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:45.2-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:45.3.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:38.7.0-1.el5_11
  • H
Out-of-Bounds

<0:45.4.0-1.el5_11
  • M
Cross-site Scripting (XSS)

<0:10.0.3-1.el5_8
  • C
Information Exposure

<0:10.0.3-1.el5_8
  • C
Resource Management Errors

<0:10.0.3-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
CVE-2012-0462

<0:10.0.3-1.el5_8
  • C
CVE-2012-0461

<0:10.0.3-1.el5_8
  • C
Out-of-Bounds

<0:10.0.4-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Resource Management Errors

<0:10.0.3-1.el5_8
  • C
Access Restriction Bypass

<0:10.0.3-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Access Restriction Bypass

<0:10.0.3-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Out-of-Bounds

<0:10.0.7-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • M
Access Restriction Bypass

<0:10.0.3-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • M
Improper Input Validation

<0:10.0.8-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.3-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Use After Free

<0:10.0.7-1.el5_8
  • C
Access Restriction Bypass

<0:10.0.8-1.el5_8
  • C
CVE-2012-3982

<0:10.0.8-1.el5_8
  • M
Out-of-bounds Read

<0:10.0.7-1.el5_8
  • C
Use After Free

<0:10.0.8-1.el5_8
  • C
Use After Free

<0:10.0.8-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.8-1.el5_8
  • C
Out-of-bounds Read

<0:10.0.8-1.el5_8
  • C
Out-of-bounds Read

<0:10.0.8-1.el5_8
  • C
Out-of-bounds Read

<0:10.0.8-1.el5_8
  • C
Out-of-bounds Read

<0:10.0.8-1.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.el5_8
  • C
Arbitrary Code Injection

<0:10.0.10-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.11-1.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.8-1.el5_8
  • C
Out-of-bounds Read

<0:10.0.8-1.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.el5_8
  • C
Out-of-Bounds

<0:10.0.11-1.el5_8
  • C
Out-of-bounds Read

<0:10.0.8-1.el5_8
  • C
Out-of-bounds Write

<0:10.0.11-1.el5_8
  • C
Origin Validation Error

<0:10.0.8-2.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.11-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.11-1.el5_8
  • C
Out-of-Bounds

<0:10.0.11-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.8-1.el5_8
  • C
Out-of-Bounds

<0:10.0.11-1.el5_8
  • C
Use After Free

<0:10.0.12-3.el5_9
  • C
Out-of-Bounds

<0:10.0.8-1.el5_8
  • C
Out-of-Bounds

<0:10.0.11-1.el5_8
  • M
Cross-site Scripting (XSS)

<0:10.0.11-1.el5_8
  • C
Out-of-Bounds

<0:10.0.11-1.el5_8
  • C
Out-of-Bounds

<0:10.0.11-1.el5_8
  • C
Use After Free

<0:10.0.12-3.el5_9
  • C
Out-of-Bounds

<0:10.0.11-1.el5_8
  • C
Arbitrary Code Injection

<0:10.0.12-3.el5_9
  • C
Use After Free

<0:10.0.12-3.el5_9
  • C
Integer Overflow or Wraparound

<0:10.0.12-3.el5_9
  • C
Out-of-Bounds

<0:10.0.12-3.el5_9
  • C
Out-of-bounds Read

<0:17.0.3-1.el5_9
  • C
Out-of-Bounds

<0:10.0.11-1.el5_8
  • C
Out-of-Bounds

<0:10.0.11-1.el5_8
  • M
Information Exposure

<0:10.0.12-3.el5_9
  • C
CVE-2013-0746

<0:10.0.12-3.el5_9
  • C
CVE-2013-0796

<0:17.0.5-1.el5_9
  • C
CVE-2013-0769

<0:10.0.12-3.el5_9
  • C
Out-of-Bounds

<0:10.0.12-3.el5_9
  • C
Use After Free

<0:17.0.3-1.el5_9
  • M
Improper Authentication

<0:10.0.12-3.el5_9
  • C
CVE-2012-5842

<0:10.0.11-1.el5_8
  • H
Out-of-bounds Write

<0:17.0.5-1.el5_9
  • C
Out-of-Bounds

<0:10.0.12-3.el5_9
  • M
Improper Certificate Validation

<0:17.0.3-1.el5_9
  • C
Out-of-Bounds

<0:17.0.7-1.el5_9
  • C
Out-of-bounds Read

<0:17.0.3-1.el5_9
  • H
Use After Free

<0:45.6.0-1.el5_11
  • C
Missing Initialization of a Variable

<0:17.0.6-1.el5_9
  • H
Out-of-Bounds

<0:38.2.0-4.el5_11
  • M
CVE-2015-4488

<0:38.2.0-4.el5_11
  • H
Use After Free

<0:38.3.0-1.el5_11
  • M
Out-of-Bounds

<0:38.2.0-4.el5_11
  • H
Execution with Unnecessary Privileges

<0:38.3.0-1.el5_11
  • H
Buffer Access with Incorrect Length Value

<0:38.3.0-1.el5_11
  • H
Improper Access Control

<0:38.3.0-1.el5_11
  • M
Out-of-Bounds

<0:38.2.0-4.el5_11
  • H
Execution with Unnecessary Privileges

<0:38.3.0-1.el5_11
  • M
Information Exposure

<0:38.3.0-1.el5_11
  • H
Heap-based Buffer Overflow

<0:38.2.0-4.el5_11
  • H
Execution with Unnecessary Privileges

<0:38.3.0-1.el5_11
  • H
Numeric Errors

<0:38.5.0-1.el5_11
  • H
Execution with Unnecessary Privileges

<0:38.3.0-1.el5_11
  • H
Execution with Unnecessary Privileges

<0:38.3.0-1.el5_11
  • H
Execution with Unnecessary Privileges

<0:38.3.0-1.el5_11
  • H
Information Exposure

<0:38.5.0-1.el5_11
  • H
Execution with Unnecessary Privileges

<0:38.3.0-1.el5_11
  • M
Out-of-Bounds

<0:38.4.0-1.el5_11
  • H
Security Features

<0:38.4.0-1.el5_11
  • C
Out-of-Bounds

<0:38.4.0-1.el5_11
  • M
Access Restriction Bypass

<0:38.4.0-1.el5_11
  • H
Integer Overflow or Wraparound

<0:38.5.0-1.el5_11
  • H
Out-of-Bounds

<0:38.4.0-1.el5_11
  • C
Out-of-Bounds

<0:38.4.0-1.el5_11
  • C
Out-of-Bounds

<0:38.5.0-1.el5_11
  • M
Integer Overflow or Wraparound

<0:38.5.0-1.el5_11