| Resource Exhaustion | |
| Improper Verification of Cryptographic Signature | |
| Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Improper Input Validation | |
| HTTP Request Smuggling | |
| Improper Input Validation | |
| Reachable Assertion | <32:9.8.2-0.62.rc1.el6_9.2 |
| Reachable Assertion | <32:9.8.2-0.47.rc1.el6_8.2 |
| Reachable Assertion | <32:9.8.2-0.68.rc1.el6_10.1 |
| Use After Free | <32:9.8.2-0.62.rc1.el6_9.5 |
| Out-of-Bounds | <32:9.8.2-0.23.rc1.el6_5.1 |
| CVE-2013-4854 | <32:9.8.2-0.17.rc1.el6_4.5 |
| Improper Authentication | <32:9.8.2-0.62.rc1.el6_9.4 |
| Improper Authentication | <32:9.8.2-0.62.rc1.el6_9.4 |
| Reachable Assertion | <32:9.8.2-0.62.rc1.el6_9.1 |
| Reachable Assertion | <32:9.8.2-0.62.rc1.el6_9.1 |
| Out-of-Bounds | <32:9.8.2-0.17.rc1.el6_4.4 |
| Improper Input Validation | <32:9.8.2-0.47.rc1.el6_8.4 |
| Reachable Assertion | <32:9.8.2-0.47.rc1.el6_8.3 |
| Improper Input Validation | |
| Improper Input Validation | <32:9.8.2-0.10.rc1.el6_3.6 |
| Reachable Assertion | <32:9.8.2-0.47.rc1.el6_8.1 |
| Resource Exhaustion | <32:9.8.2-0.68.rc1.el6_10.8 |
| Numeric Errors | <32:9.8.2-0.10.rc1.el6_3.5 |
| CVE-2012-4244 | <32:9.8.2-0.10.rc1.el6_3.3 |
| Improper Input Validation | <32:9.8.2-0.10.rc1.el6_3.2 |
| Reachable Assertion | <32:9.8.2-0.37.rc1.el6_7.7 |
| Reachable Assertion | <32:9.8.2-0.37.rc1.el6_7.7 |
| Improper Input Validation | <32:9.8.2-0.37.rc1.el6_7.6 |
| Improper Input Validation | <32:9.8.2-0.37.rc1.el6_7.5 |
| Numeric Errors | |
| CVE-2012-1033 | |
| CVE-2011-4313 | |
| Reachable Assertion | <32:9.8.2-0.37.rc1.el6_7.4 |
| Missing Initialization of a Variable | <32:9.8.2-0.37.rc1.el6_7.2 |
| Missing Initialization of a Variable | <32:9.8.2-0.37.rc1.el6_7.1 |
| CVE-2011-2464 | |
| Resource Exhaustion | <32:9.8.2-0.68.rc1.el6_10.7 |
| Reachable Assertion | <32:9.8.2-0.68.rc1.el6_10.7 |
| Numeric Errors | |
| Unchecked Error Condition | <32:9.8.2-0.30.rc1.el6_6.2 |
| Resource Exhaustion | <32:9.8.2-0.30.rc1.el6_6.1 |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Access Control | |
| Improper Access Control | |
| Reachable Assertion | |
| Allocation of Resources Without Limits or Throttling | <32:9.8.2-0.68.rc1.el6_10.3 |
| Improper Input Validation | |
| Resource Management Errors | |
| Authentication Bypass | |