chromium-browser vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the chromium-browser package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Out-of-bounds Write

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Out-of-bounds Write

<0:86.0.4240.183-1.el6_10
  • H
Use After Free

<0:86.0.4240.198-1.el6_10
  • H
Improperly Implemented Security Check for Standard

<0:86.0.4240.198-1.el6_10
  • H
Out-of-bounds Write

<0:86.0.4240.111-1.el6_10
  • H
Out-of-bounds Write

<0:86.0.4240.183-1.el6_10
  • H
CVE-2020-16016

<0:86.0.4240.198-1.el6_10
  • H
Use After Free

<0:86.0.4240.111-1.el6_10
  • H
Out-of-bounds Write

<0:86.0.4240.183-1.el6_10
  • H
Out-of-bounds Write

<0:86.0.4240.183-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • C
CVE-2020-15979

<0:86.0.4240.75-1.el6_10
  • C
CVE-2020-15980

<0:86.0.4240.75-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • C
Integer Overflow or Wraparound

<0:86.0.4240.75-1.el6_10
  • H
Use After Free

<0:86.0.4240.183-1.el6_10
  • C
CVE-2020-15984

<0:86.0.4240.75-1.el6_10
  • C
Improper Input Validation

<0:86.0.4240.75-1.el6_10
  • C
CVE-2020-15988

<0:86.0.4240.75-1.el6_10
  • H
Out-of-bounds Read

<0:84.0.4147.135-1.el6_10
  • H
Improper Preservation of Permissions

<0:85.0.4183.83-1.el6_10
  • H
Out-of-bounds Write

<0:85.0.4183.121-1.el6_10
  • C
Improper Initialization

<0:86.0.4240.75-1.el6_10
  • C
CVE-2020-6557

<0:86.0.4240.75-1.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • C
CVE-2020-15992

<0:86.0.4240.75-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • C
CVE-2020-15973

<0:86.0.4240.75-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • H
Use After Free

<0:85.0.4183.102-1.el6_10
  • C
Integer Overflow or Wraparound

<0:86.0.4240.75-1.el6_10
  • H
Race Condition

<0:85.0.4183.102-1.el6_10
  • H
CVE-2020-15962

<0:85.0.4183.121-1.el6_10
  • H
Improper Input Validation

<0:85.0.4183.83-1.el6_10
  • H
Out-of-bounds Write

<0:85.0.4183.121-1.el6_10
  • H
Heap-based Buffer Overflow

<0:84.0.4147.135-1.el6_10
  • H
CVE-2020-15961

<0:85.0.4183.121-1.el6_10
  • H
CVE-2020-6563

<0:85.0.4183.83-1.el6_10
  • C
Improper Input Validation

<0:86.0.4240.75-1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:85.0.4183.121-1.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • C
Improper Input Validation

<0:86.0.4240.75-1.el6_10
  • H
CVE-2020-15963

<0:85.0.4183.121-1.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • H
CVE-2020-6574

<0:85.0.4183.102-1.el6_10
  • C
Out-of-bounds Write

<0:84.0.4147.105-2.el6_10
  • C
Information Exposure

<0:84.0.4147.105-2.el6_10
  • C
Buffer Overflow

<0:84.0.4147.105-2.el6_10
  • C
Use After Free

<0:84.0.4147.105-2.el6_10
  • H
Use After Free

<0:85.0.4183.102-1.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • H
Improperly Implemented Security Check for Standard

<0:85.0.4183.83-1.el6_10
  • C
CVE-2020-15982

<0:86.0.4240.75-1.el6_10
  • H
CVE-2020-6560

<0:85.0.4183.83-1.el6_10
  • C
Out-of-bounds Read

<0:86.0.4240.75-1.el6_10
  • C
Use After Free

<0:84.0.4147.105-2.el6_10
  • C
CVE-2020-6526

<0:84.0.4147.105-2.el6_10
  • C
Out-of-bounds Write

<0:84.0.4147.105-2.el6_10
  • H
Improper Input Validation

<0:85.0.4183.83-1.el6_10
  • C
Heap-based Buffer Overflow

<0:84.0.4147.105-2.el6_10
  • H
CVE-2020-15959

<0:85.0.4183.102-1.el6_10
  • C
CVE-2020-6516

<0:84.0.4147.105-2.el6_10
  • C
CVE-2020-6522

<0:84.0.4147.105-2.el6_10
  • C
Incorrect Default Permissions

<0:84.0.4147.105-2.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • C
Out-of-bounds Write

<0:84.0.4147.105-2.el6_10
  • C
Information Exposure

<0:84.0.4147.105-2.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:84.0.4147.105-2.el6_10
  • C
Improper Input Validation

<0:84.0.4147.105-2.el6_10
  • H
Out-of-bounds Write

<0:83.0.4103.106-1.el6_10
  • C
Out-of-Bounds

<0:84.0.4147.105-2.el6_10
  • C
Improper Input Validation

<0:84.0.4147.105-2.el6_10
  • H
Improper Privilege Management

<0:84.0.4147.135-1.el6_10
  • C
Information Exposure

<0:84.0.4147.105-2.el6_10
  • H
Information Exposure

<0:84.0.4147.135-1.el6_10
  • C
Heap-based Buffer Overflow

<0:84.0.4147.105-2.el6_10
  • C
Out-of-bounds Write

<0:84.0.4147.105-2.el6_10
  • H
Improperly Implemented Security Check for Standard

<0:83.0.4103.106-1.el6_10
  • H
CVE-2020-6491

<0:83.0.4103.97-1.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • H
Heap-based Buffer Overflow

<0:84.0.4147.135-1.el6_10
  • H
Information Exposure

<0:83.0.4103.97-1.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:84.0.4147.105-2.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • C
Incorrect Authorization

<0:84.0.4147.105-2.el6_10
  • C
CVE-2020-6536

<0:84.0.4147.105-2.el6_10
  • C
Out-of-bounds Write

<0:84.0.4147.105-2.el6_10
  • H
Improper Input Validation

<0:83.0.4103.97-1.el6_10
  • C
CVE-2020-6519

<0:84.0.4147.105-2.el6_10
  • H
Use After Free

<0:83.0.4103.116-1.el6_10
  • H
Use After Free

<0:83.0.4103.106-1.el6_10
  • H
Exposure of Resource to Wrong Sphere

<0:83.0.4103.97-1.el6_10
  • H
Use After Free

<0:83.0.4103.97-1.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • H
Cross-site Scripting (XSS)

<0:83.0.4103.97-1.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • H
Use After Free

<0:83.0.4103.97-1.el6_10
  • H
Improper Input Validation

<0:83.0.4103.97-1.el6_10
  • H
CVE-2020-6486

<0:83.0.4103.97-1.el6_10
  • H
CVE-2020-6481

<0:83.0.4103.97-1.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • H
CVE-2020-6478

<0:83.0.4103.97-1.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • H
CVE-2020-6479

<0:83.0.4103.97-1.el6_10
  • H
Use After Free

<0:83.0.4103.97-1.el6_10
  • H
Information Exposure

<0:83.0.4103.97-1.el6_10
  • H
CVE-2020-6475

<0:83.0.4103.97-1.el6_10
  • H
Use After Free

<0:83.0.4103.97-1.el6_10
  • H
Incorrect Default Permissions

<0:83.0.4103.97-1.el6_10
  • H
Information Exposure

<0:83.0.4103.97-1.el6_10
  • H
Use After Free

<0:81.0.4044.129-1.el6_10
  • H
CVE-2020-6460

<0:81.0.4044.122-1.el6_10
  • H
Use After Free

<0:81.0.4044.129-1.el6_10
  • H
Use After Free

<0:81.0.4044.122-1.el6_10
  • H
Use After Free

<0:83.0.4103.97-1.el6_10
  • H
Out-of-bounds Read

<0:81.0.4044.122-1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:81.0.4044.138-1.el6_10
  • H
Use After Free

<0:86.0.4240.111-1.el6_10
  • H
Use After Free

<0:86.0.4240.111-1.el6_10
  • H
Use After Free

<0:81.0.4044.92-2.el6_10
  • H
Out-of-Bounds

<0:81.0.4044.92-2.el6_10
  • H
CVE-2020-6432

<0:81.0.4044.92-2.el6_10
  • H
Incorrect Default Permissions

<0:81.0.4044.92-2.el6_10
  • H
Improperly Implemented Security Check for Standard

<0:80.0.3987.162-1.el6_10
  • H
Incorrect Default Permissions

<0:81.0.4044.92-2.el6_10
  • H
Out-of-Bounds

<0:80.0.3987.149-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.149-1.el6_10
  • H
Out-of-bounds Read

<0:81.0.4044.92-2.el6_10
  • H
CVE-2020-6440

<0:81.0.4044.92-2.el6_10
  • C
CVE-2020-15985

<0:86.0.4240.75-1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:81.0.4044.92-2.el6_10
  • H
Use After Free

<0:81.0.4044.92-2.el6_10
  • H
Incorrect Default Permissions

<0:81.0.4044.92-2.el6_10
  • H
CVE-2020-15966

<0:85.0.4183.121-1.el6_10
  • H
Use After Free

<0:80.0.3987.149-1.el6_10
  • H
Improperly Implemented Security Check for Standard

<0:80.0.3987.132-1.el6_10
  • H
Use After Free

<0:80.0.3987.149-1.el6_10
  • H
Use After Free

<0:80.0.3987.162-1.el6_10
  • H
Information Exposure

<0:81.0.4044.92-2.el6_10
  • H
CVE-2020-6435

<0:81.0.4044.92-2.el6_10
  • H
CVE-2020-6437

<0:81.0.4044.92-2.el6_10
  • H
Use After Free

<0:81.0.4044.92-2.el6_10
  • H
Use After Free

<0:80.0.3987.149-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • H
Use After Free

<0:81.0.4044.92-2.el6_10
  • H
Out-of-bounds Write

<0:81.0.4044.92-2.el6_10
  • H
Out-of-bounds Read

<0:81.0.4044.92-2.el6_10
  • H
Use After Free

<0:80.0.3987.149-1.el6_10
  • H
Information Exposure

<0:85.0.4183.83-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • H
CVE-2020-6566

<0:85.0.4183.83-1.el6_10
  • H
Integer Overflow or Wraparound

<0:85.0.4183.83-1.el6_10
  • H
Use After Free

<0:81.0.4044.92-2.el6_10
  • H
Incorrect Permission Assignment for Critical Resource

<0:85.0.4183.83-1.el6_10
  • H
CVE-2020-6500

<0:80.0.3987.87-1.el6_10
  • H
CVE-2020-6499

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
CVE-2020-6568

<0:85.0.4183.83-1.el6_10
  • H
CVE-2020-6565

<0:85.0.4183.83-1.el6_10
  • H
CVE-2020-6433

<0:81.0.4044.92-2.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Incorrect Default Permissions

<0:81.0.4044.92-2.el6_10
  • H
Use After Free

<0:84.0.4147.135-1.el6_10
  • H
Insufficient Verification of Data Authenticity

<0:81.0.4044.92-2.el6_10
  • H
Exposure of Resource to Wrong Sphere

<0:81.0.4044.92-2.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:80.0.3987.122-1.el6_10
  • H
Incorrect Default Permissions

<0:80.0.3987.87-1.el6_10
  • H
Out-of-bounds Write

<0:80.0.3987.122-1.el6_10
  • H
Use After Free

<0:85.0.4183.83-1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:80.0.3987.122-1.el6_10
  • H
Use After Free

<0:80.0.3987.149-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
CVE-2020-6410

<0:80.0.3987.87-1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:84.0.4147.105-2.el6_10
  • C
Use After Free

<0:84.0.4147.105-2.el6_10
  • H
Out-of-bounds Read

<0:80.0.3987.87-1.el6_10
  • H
Out-of-Bounds

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Out-of-Bounds

<0:80.0.3987.87-1.el6_10
  • H
Out-of-bounds Write

<0:80.0.3987.87-1.el6_10
  • H
NULL Pointer Dereference

<0:80.0.3987.87-1.el6_10
  • C
Use After Free

<0:84.0.4147.105-2.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Integer Overflow or Wraparound

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:80.0.3987.87-1.el6_10
  • C
Use After Free

<0:84.0.4147.105-2.el6_10
  • H
Use After Free

<0:80.0.3987.122-1.el6_10
  • C
Out-of-bounds Write

<0:84.0.4147.105-2.el6_10
  • H
Information Exposure

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:79.0.3945.130-1.el6_10
  • H
CVE-2020-6417

<0:80.0.3987.87-1.el6_10
  • C
Improperly Implemented Security Check for Standard

<0:84.0.4147.105-2.el6_10
  • H
Information Exposure

<0:80.0.3987.87-1.el6_10
  • H
Use After Free

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Out-of-Bounds

<0:80.0.3987.87-1.el6_10
  • H
Out-of-bounds Write

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • C
CVE-2019-13757

<0:79.0.3945.79-1.el6_10
  • C
CVE-2019-13761

<0:79.0.3945.79-1.el6_10
  • H
Out-of-Bounds

<0:80.0.3987.87-1.el6_10
  • C
CVE-2019-13754

<0:79.0.3945.79-1.el6_10
  • C
Cross-site Scripting (XSS)

<0:79.0.3945.79-1.el6_10
  • C
Origin Validation Error

<0:79.0.3945.79-1.el6_10
  • C
Out-of-bounds Write

<0:79.0.3945.79-1.el6_10
  • H
Use After Free

<0:79.0.3945.130-1.el6_10
  • C
Improper Locking

<0:79.0.3945.79-1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:79.0.3945.79-1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:83.0.4103.97-1.el6_10
  • C
Missing Authorization

<0:79.0.3945.79-1.el6_10
  • H
Use After Free

<0:83.0.4103.97-1.el6_10
  • C
CVE-2019-13749

<0:79.0.3945.79-1.el6_10
  • C
CVE-2019-13758

<0:79.0.3945.79-1.el6_10
  • C
Out-of-Bounds

<0:79.0.3945.79-1.el6_10
  • H
Out-of-bounds Write

<0:79.0.3945.88-1.el6_10
  • C
CVE-2019-13759

<0:79.0.3945.79-1.el6_10
  • C
Information Exposure

<0:79.0.3945.79-1.el6_10
  • C
CVE-2019-13746

<0:79.0.3945.79-1.el6_10
  • C
Out-of-bounds Write

<0:79.0.3945.79-1.el6_10
  • C
CVE-2019-13739

<0:79.0.3945.79-1.el6_10
  • C
Use After Free

<0:79.0.3945.79-1.el6_10
  • H
Use After Free

<0:79.0.3945.117-1.el6_10
  • C
Improper Preservation of Permissions

<0:79.0.3945.79-1.el6_10
  • C
Out-of-bounds Write

<0:79.0.3945.79-1.el6_10
  • C
Out-of-bounds Write

<0:79.0.3945.79-1.el6_10
  • C
Improper Privilege Management

<0:79.0.3945.79-1.el6_10
  • C
CVE-2019-13763

<0:79.0.3945.79-1.el6_10
  • C
Information Exposure

<0:79.0.3945.79-1.el6_10
  • C
CVE-2019-13756

<0:79.0.3945.79-1.el6_10
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:79.0.3945.79-1.el6_10
  • C
CVE-2019-13755

<0:79.0.3945.79-1.el6_10
  • C
Information Exposure

<0:79.0.3945.79-1.el6_10
  • H
CVE-2019-13710

<0:78.0.3904.70-1.el6_10
  • H
Arbitrary Code Injection

<0:78.0.3904.70-1.el6_10
  • H
Out-of-bounds Write

<0:78.0.3904.70-1.el6_10
  • H
Authentication Bypass

<0:78.0.3904.70-1.el6_10
  • H
Information Exposure

<0:78.0.3904.70-1.el6_10
  • H
Information Exposure

<0:78.0.3904.70-1.el6_10
  • H
Authentication Bypass

<0:78.0.3904.70-1.el6_10
  • H
Authentication Bypass

<0:78.0.3904.70-1.el6_10
  • H
Use After Free

<0:78.0.3904.87-1.el6_10
  • H
Authentication Bypass

<0:78.0.3904.70-1.el6_10
  • H
Out-of-Bounds

<0:78.0.3904.108-1.el6_10
  • C
Out-of-bounds Read

<0:77.0.3865.120-2.el6_10
  • H
Use After Free

<0:78.0.3904.108-1.el6_10
  • H
Use After Free

<0:78.0.3904.70-1.el6_10
  • H
CVE-2019-13718

<0:78.0.3904.70-1.el6_10
  • C
Information Exposure

<0:77.0.3865.120-2.el6_10
  • H
Authentication Bypass

<0:78.0.3904.70-1.el6_10
  • H
Insecure Storage of Sensitive Information

<0:78.0.3904.70-1.el6_10
  • C
Information Exposure

<0:77.0.3865.120-2.el6_10
  • C
Out-of-bounds Write

<0:77.0.3865.120-2.el6_10
  • C
Out-of-bounds Write

<0:77.0.3865.120-2.el6_10
  • H
Out-of-bounds Write

<0:78.0.3904.70-1.el6_10
  • C
Incorrect Permission Assignment for Critical Resource

<0:77.0.3865.120-2.el6_10
  • C
Out-of-bounds Write

<0:77.0.3865.120-2.el6_10
  • C
CVE-2019-13674

<0:77.0.3865.120-2.el6_10
  • C
Missing Authorization

<0:77.0.3865.120-2.el6_10
  • C
Use After Free

<0:77.0.3865.120-2.el6_10
  • C
Improper Input Validation

<0:77.0.3865.120-2.el6_10
  • H
Information Exposure

<0:78.0.3904.70-1.el6_10
  • C
Improper Preservation of Permissions

<0:77.0.3865.120-2.el6_10
  • H
Incorrect Authorization

<0:78.0.3904.70-1.el6_10
  • C
Incorrect Permission Assignment for Critical Resource

<0:77.0.3865.120-2.el6_10
  • C
CVE-2019-13669

<0:77.0.3865.120-2.el6_10
  • C
CVE-2019-13680

<0:77.0.3865.120-2.el6_10
  • H
Incorrect Default Permissions

<0:81.0.4044.92-2.el6_10
  • H
Incorrect Default Permissions

<0:81.0.4044.92-2.el6_10
  • C
Incorrect Permission Assignment for Critical Resource

<0:77.0.3865.120-2.el6_10
  • C
Out-of-bounds Write

<0:77.0.3865.120-2.el6_10
  • C
Improper Input Validation

<0:77.0.3865.120-2.el6_10
  • C
Use After Free

<0:81.0.4044.113-1.el6_10
  • H
Heap-based Buffer Overflow

<0:80.0.3987.162-1.el6_10
  • H
Use After Free

<0:80.0.3987.162-1.el6_10
  • C
Use After Free

<0:77.0.3865.120-2.el6_10
  • C
CVE-2019-13661

<0:77.0.3865.120-2.el6_10
  • C
Out-of-bounds Write

<0:77.0.3865.120-2.el6_10
  • C
Use After Free

<0:77.0.3865.120-2.el6_10
  • H
Use After Free

<0:80.0.3987.149-1.el6_10
  • C
Improper Input Validation

<0:77.0.3865.120-2.el6_10
  • C
Improper Input Validation

<0:77.0.3865.120-2.el6_10
  • C
Out-of-bounds Write

<0:77.0.3865.120-2.el6_10
  • C
Improper Input Validation

<0:77.0.3865.120-2.el6_10
  • H
Use After Free

<0:78.0.3904.87-1.el6_10
  • C
CVE-2019-13691

<0:77.0.3865.120-2.el6_10
  • H
Information Exposure

<0:78.0.3904.70-1.el6_10
  • C
Information Exposure

<0:77.0.3865.120-2.el6_10
  • C
CVE-2019-13660

<0:77.0.3865.120-2.el6_10
  • C
CVE-2019-13659

<0:77.0.3865.120-2.el6_10
  • H
Insecure Storage of Sensitive Information

<0:78.0.3904.70-1.el6_10
  • C
CVE-2019-13663

<0:77.0.3865.120-2.el6_10
  • H
Use After Free

<0:80.0.3987.122-1.el6_10
  • C
Incorrect Default Permissions

<0:77.0.3865.120-2.el6_10
  • C
Incorrect Permission Assignment for Critical Resource

<0:77.0.3865.120-2.el6_10
  • C
CVE-2019-13667

<0:77.0.3865.120-2.el6_10
  • C
Use After Free

<0:77.0.3865.120-2.el6_10
  • C
Use After Free

<0:77.0.3865.120-2.el6_10
  • H
Incorrect Default Permissions

<0:80.0.3987.87-1.el6_10
  • H
CVE-2020-6409

<0:80.0.3987.87-1.el6_10
  • H
CVE-2020-6413

<0:80.0.3987.87-1.el6_10
  • H
CVE-2020-6414

<0:80.0.3987.87-1.el6_10
  • H
DEPRECATED: Use of Uninitialized Resource

<0:80.0.3987.87-1.el6_10
  • H
Out-of-Bounds

<0:80.0.3987.87-1.el6_10
  • C
Use After Free

<0:77.0.3865.120-2.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • C
Use After Free

<0:77.0.3865.120-2.el6_10
  • H
Use After Free

<0:79.0.3945.130-1.el6_10
  • C
CVE-2019-13671

<0:77.0.3865.120-2.el6_10
  • H
Out-of-bounds Write

<0:76.0.3809.132-1.el6_10
  • C
CVE-2019-13742

<0:79.0.3945.79-1.el6_10
  • C
Out-of-bounds Write

<0:79.0.3945.79-1.el6_10
  • C
Out-of-bounds Write

<0:79.0.3945.79-1.el6_10
  • C
CVE-2019-13743

<0:79.0.3945.79-1.el6_10
  • H
Out-of-bounds Write

<0:76.0.3809.87-1.el6_10
  • H
Incorrect Calculation

<0:76.0.3809.87-1.el6_10
  • H
Improper Input Validation

<0:76.0.3809.87-1.el6_10
  • H
Out-of-bounds Write

<0:76.0.3809.87-1.el6_10
  • H
Improper Input Validation

<0:76.0.3809.87-1.el6_10
  • H
Out-of-bounds Write

<0:76.0.3809.87-1.el6_10
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:76.0.3809.87-1.el6_10
  • H
Cleartext Storage of Sensitive Information

<0:75.0.3770.142-1.el6_10
  • H
Out-of-bounds Write

<0:75.0.3770.142-1.el6_10
  • H
Improper Input Validation

<0:76.0.3809.87-1.el6_10
  • H
Use After Free

<0:76.0.3809.87-1.el6_10
  • H
Improper Input Validation

<0:76.0.3809.87-1.el6_10
  • H
Improper Input Validation

<0:76.0.3809.87-1.el6_10
  • H
Authentication Bypass

<0:78.0.3904.70-1.el6_10
  • H
Out-of-bounds Write

<0:76.0.3809.87-1.el6_10
  • H
Out-of-bounds Write

<0:75.0.3770.90-1.el6_10
  • H
Improper Privilege Management

<0:78.0.3904.70-1.el6_10
  • H
Improper Input Validation

<0:76.0.3809.87-1.el6_10
  • H
Out-of-bounds Read

<0:75.0.3770.80-1.el6_10
  • H
CVE-2019-5833

<0:75.0.3770.80-1.el6_10
  • H
Improper Input Validation

<0:74.0.3729.131-1.el6_10
  • C
Use After Free

<0:77.0.3865.120-2.el6_10
  • C
Improper Preservation of Permissions

<0:77.0.3865.120-2.el6_10
  • C
Use After Free

<0:77.0.3865.120-2.el6_10
  • H
CVE-2019-5832

<0:75.0.3770.80-1.el6_10
  • H
Out-of-bounds Write

<0:75.0.3770.80-1.el6_10
  • C
Incorrect Permission Assignment for Critical Resource

<0:77.0.3865.120-2.el6_10
  • C
CVE-2019-13678

<0:77.0.3865.120-2.el6_10
  • C
Improper Handling of Exceptional Conditions

<0:77.0.3865.120-2.el6_10
  • H
Race Condition

<0:75.0.3770.80-1.el6_10
  • H
CVE-2019-5837

<0:75.0.3770.80-1.el6_10
  • H
Use After Free

<0:75.0.3770.80-1.el6_10
  • C
Origin Validation Error

<0:77.0.3865.120-2.el6_10
  • H
Out-of-bounds Write

<0:75.0.3770.80-1.el6_10
  • H
Integer Overflow or Wraparound

<0:75.0.3770.80-1.el6_10
  • H
Improper Input Validation

<0:75.0.3770.80-1.el6_10
  • H
Improper Input Validation

<0:75.0.3770.80-1.el6_10
  • H
Improperly Implemented Security Check for Standard

<0:74.0.3729.108-1.el6_10
  • H
Double Free

<0:73.0.3683.75-1.el6_10
  • H
Integer Overflow or Wraparound

<0:73.0.3683.75-1.el6_10
  • H
Improper Input Validation

<0:73.0.3683.75-1.el6_10
  • H
Out-of-bounds Read

<0:73.0.3683.75-1.el6_10
  • H
Use of Uninitialized Resource

<0:74.0.3729.108-1.el6_10
  • H
Open Redirect

<0:74.0.3729.108-1.el6_10
  • H
Improper Input Validation

<0:74.0.3729.108-1.el6_10
  • H
Out-of-bounds Write

<0:74.0.3729.108-1.el6_10
  • H
Cleartext Storage of Sensitive Information

<0:74.0.3729.108-1.el6_10
  • H
Improper Access Control

<0:74.0.3729.108-1.el6_10
  • H
Out-of-bounds Write

<0:74.0.3729.108-1.el6_10
  • H
Out-of-bounds Write

<0:74.0.3729.108-1.el6_10
  • H
Improper Data Handling

<0:74.0.3729.108-1.el6_10
  • H
Out-of-bounds Write

<0:74.0.3729.108-1.el6_10
  • H
Improper Input Validation

<0:73.0.3683.75-1.el6_10
  • H
Out-of-bounds Write

<0:74.0.3729.108-1.el6_10
  • H
Improper Input Validation

<0:73.0.3683.75-1.el6_10
  • H
Race Condition

<0:73.0.3683.75-1.el6_10
  • M
Improper Data Handling

<0:72.0.3626.96-1.el6_10
  • H
Out-of-bounds Write

<0:74.0.3729.108-1.el6_10
  • C
Improper Restriction of Rendered UI Layers or Frames

<0:72.0.3626.81-1.el6_10
  • H
Improper Input Validation

<0:73.0.3683.75-1.el6_10
  • C
Out-of-bounds Write

<0:72.0.3626.81-1.el6_10
  • H
Improper Input Validation

<0:73.0.3683.75-1.el6_10
  • C
Incorrect Type Conversion or Cast

<0:72.0.3626.81-1.el6_10
  • H
Improper Input Validation

<0:73.0.3683.75-1.el6_10
  • C
Use After Free

<0:72.0.3626.81-1.el6_10
  • C
CVE-2019-5766

<0:72.0.3626.81-1.el6_10
  • H
Out-of-bounds Read

<0:71.0.3578.80-1.el6_10
  • H
Integer Overflow or Wraparound

<0:73.0.3683.75-1.el6_10
  • H
Improper Input Validation

<0:71.0.3578.80-1.el6_10
  • H
CVE-2018-18346

<0:71.0.3578.80-1.el6_10
  • H
Integer Overflow or Wraparound

<0:73.0.3683.75-1.el6_10
  • H
Out-of-bounds Write

<0:73.0.3683.75-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • C
Improper Input Validation

<0:72.0.3626.81-1.el6_10
  • C
Missing Authorization

<0:72.0.3626.81-1.el6_10
  • C
CVE-2019-5771

<0:72.0.3626.81-1.el6_10
  • C
Cross-site Scripting (XSS)

<0:72.0.3626.81-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • H
Improper Input Validation

<0:76.0.3809.87-1.el6_10
  • C
Cleartext Storage of Sensitive Information

<0:72.0.3626.81-1.el6_10
  • H
Use After Free

<0:72.0.3626.121-1.el6_10
  • H
Out-of-bounds Write

<0:76.0.3809.87-1.el6_10
  • C
Improper Input Validation

<0:72.0.3626.81-1.el6_10
  • H
Out-of-bounds Write

<0:70.0.3538.110-1.el6_10
  • C
Out-of-bounds Write

<0:72.0.3626.81-1.el6_10
  • C
Improper Input Validation

<0:72.0.3626.81-1.el6_10
  • C
Out-of-bounds Write

<0:72.0.3626.81-1.el6_10
  • H
CVE-2018-18355

<0:71.0.3578.80-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • C
Out-of-bounds Read

<0:72.0.3626.81-1.el6_10
  • C
Improper Input Validation

<0:72.0.3626.81-1.el6_10
  • H
Improper Input Validation

<0:71.0.3578.80-1.el6_10
  • C
Improper Input Validation

<0:72.0.3626.81-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • H
CVE-2018-18353

<0:71.0.3578.80-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • C
Improper Check for Unusual or Exceptional Conditions

<0:72.0.3626.81-1.el6_10
  • C
Out-of-bounds Write

<0:72.0.3626.81-1.el6_10
  • C
Out-of-Bounds

<0:72.0.3626.81-1.el6_10
  • C
Improper Input Validation

<0:72.0.3626.81-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • C
Improper Input Validation

<0:72.0.3626.81-1.el6_10
  • C
Use After Free

<0:72.0.3626.81-1.el6_10
  • C
Out-of-bounds Write

<0:72.0.3626.81-1.el6_10
  • C
Numeric Errors

<0:72.0.3626.81-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • H
Missing Release of Resource after Effective Lifetime

<0:70.0.3538.67-1.el6_10
  • H
CVE-2018-18357

<0:71.0.3578.80-1.el6_10
  • C
Cryptographic Issues

<0:72.0.3626.81-1.el6_10
  • H
CVE-2018-18350

<0:71.0.3578.80-1.el6_10
  • H
Improper Input Validation

<0:71.0.3578.80-1.el6_10
  • H
CVE-2018-17477

<0:70.0.3538.67-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • H
CVE-2018-18348

<0:71.0.3578.80-1.el6_10
  • H
Incorrect Permission Assignment for Critical Resource

<0:71.0.3578.80-1.el6_10
  • H
CVE-2019-5830

<0:75.0.3770.80-1.el6_10
  • H
CVE-2018-17464

<0:70.0.3538.67-1.el6_10
  • H
CVE-2018-17463

<0:70.0.3538.67-1.el6_10
  • H
CVE-2018-17476

<0:70.0.3538.67-1.el6_10
  • H
Missing Authorization

<0:69.0.3497.81-1.el6_10
  • H
Out-of-Bounds

<0:70.0.3538.67-1.el6_10
  • H
Improper Authorization

<0:69.0.3497.81-1.el6_10
  • H
Out-of-bounds Read

<0:70.0.3538.67-1.el6_10
  • H
Out-of-bounds Write

<0:69.0.3497.81-1.el6_10
  • H
Out-of-bounds Write

<0:69.0.3497.81-1.el6_10
  • H
Incomplete Cleanup

<0:70.0.3538.67-1.el6_10
  • H
CVE-2018-17471

<0:70.0.3538.67-1.el6_10
  • H
CVE-2018-17473

<0:70.0.3538.67-1.el6_10
  • H
Out-of-bounds Read

<0:69.0.3497.81-1.el6_10
  • H
Information Exposure

<0:70.0.3538.67-1.el6_10
  • H
Use After Free

<0:70.0.3538.67-1.el6_10
  • H
Improperly Implemented Security Check for Standard

<0:74.0.3729.108-1.el6_10
  • H
Use After Free

<0:74.0.3729.108-1.el6_10
  • H
Use After Free

<0:70.0.3538.67-1.el6_10
  • H
Out-of-bounds Write

<0:74.0.3729.108-1.el6_10
  • H
Out-of-bounds Write

<0:74.0.3729.108-1.el6_10
  • H
Cross-site Request Forgery (CSRF)

<0:74.0.3729.108-1.el6_10
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:74.0.3729.108-1.el6_10
  • H
Out-of-bounds Write

<0:74.0.3729.108-1.el6_10
  • H
Improper Input Validation

<0:69.0.3497.81-1.el6_10
  • H
Race Condition

<0:69.0.3497.81-1.el6_10
  • H
CVE-2018-16075

<0:69.0.3497.81-1.el6_10
  • H
Improper Validation of Array Index

<0:69.0.3497.100-1.el6_10
  • H
Integer Overflow or Wraparound

<0:73.0.3683.75-1.el6_10
  • H
Out-of-bounds Write

<0:69.0.3497.81-1.el6_10
  • H
Improper Authorization

<0:69.0.3497.81-1.el6_10
  • H
Out-of-bounds Write

<0:69.0.3497.81-1.el6_10
  • H
Integer Overflow or Wraparound

<0:73.0.3683.75-1.el6_10
  • H
Out-of-bounds Read

<0:69.0.3497.81-1.el6_10
  • H
Improper Authorization

<0:69.0.3497.81-1.el6_10
  • H
Information Exposure

<0:69.0.3497.81-1.el6_10
  • H
CVE-2018-17459

<0:69.0.3497.100-1.el6_10
  • H
Cross-site Scripting (XSS)

<0:69.0.3497.81-1.el6_10
  • H
Out-of-bounds Read

<0:69.0.3497.81-1.el6_10
  • H
Incorrect Permission Assignment for Critical Resource

<0:69.0.3497.81-1.el6_10
  • H
Out-of-bounds Read

<0:69.0.3497.81-1.el6_10
  • H
Improper Authorization

<0:69.0.3497.81-1.el6_10
  • H
Improper Input Validation

<0:69.0.3497.81-1.el6_10
  • H
CVE-2018-6175

<0:68.0.3440.75-1.el6_10
  • H
Out-of-bounds Write

<0:68.0.3440.75-1.el6_10
  • H
Integer Overflow or Wraparound

<0:68.0.3440.75-1.el6_10
  • H
Use After Free

<0:68.0.3440.75-1.el6_10
  • H
Out-of-bounds Write

<0:68.0.3440.75-1.el6_10
  • C
Improper Input Validation

<0:72.0.3626.81-1.el6_10
  • C
Improper Input Validation

<0:72.0.3626.81-1.el6_10
  • H
CVE-2018-6165

<0:68.0.3440.75-1.el6_10
  • C
Improper Privilege Management

<0:72.0.3626.81-1.el6_10
  • H
Improper Input Validation

<0:71.0.3578.80-1.el6_10
  • H
CVE-2018-18345

<0:71.0.3578.80-1.el6_10
  • H
Out-of-bounds Write

<0:71.0.3578.80-1.el6_10
  • H
CVE-2018-6172

<0:68.0.3440.75-1.el6_10
  • H
CVE-2018-6173

<0:68.0.3440.75-1.el6_10
  • H
Improper Input Validation

<0:68.0.3440.75-1.el6_10
  • H
Improper Privilege Management

<0:71.0.3578.80-1.el6_10
  • H
Incorrect Permission Assignment for Critical Resource

<0:71.0.3578.80-1.el6_10
  • H
CVE-2018-6167

<0:68.0.3440.75-1.el6_10
  • H
Information Exposure

<0:68.0.3440.75-1.el6_10
  • H
Out-of-bounds Write

<0:68.0.3440.75-1.el6_10
  • H
Improper Input Validation

<0:68.0.3440.75-1.el6_10
  • H
Information Exposure

<0:68.0.3440.75-1.el6_10
  • H
Information Exposure

<0:68.0.3440.75-1.el6_10
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:68.0.3440.75-1.el6_10
  • H
Improper Validation of Array Index

<0:70.0.3538.110-1.el6_10
  • H
Out-of-bounds Write

<0:68.0.3440.75-1.el6_10
  • H
CVE-2018-6166

<0:68.0.3440.75-1.el6_10
  • H
Improper Input Validation

<0:68.0.3440.75-1.el6_10
  • H
Incorrect Type Conversion or Cast

<0:68.0.3440.75-1.el6_10
  • H
Out-of-bounds Write

<0:68.0.3440.75-1.el6_10
  • H
Out-of-bounds Write

<0:70.0.3538.67-1.el6_10
  • H
CVE-2018-17475

<0:70.0.3538.67-1.el6_10
  • H
Information Exposure

<0:68.0.3440.75-1.el6_10
  • H
Information Exposure

<0:68.0.3440.75-1.el6_10
  • H
Out-of-bounds Read

<0:68.0.3440.75-1.el6_10
  • H
Improper Input Validation

<0:68.0.3440.75-1.el6_10
  • H
Race Condition

<0:68.0.3440.75-1.el6_10
  • H
Out-of-bounds Write

<0:68.0.3440.75-1.el6_10
  • H
Information Exposure

<0:68.0.3440.75-1.el6_10
  • H
Unrestricted Upload of File with Dangerous Type

<0:68.0.3440.75-1.el6_10
  • H
Out-of-bounds Write

<0:67.0.3396.87-1.el6_10
  • H
Out-of-bounds Read

<0:67.0.3396.62-2.el6_9
  • H
Out-of-bounds Write

<0:69.0.3497.81-1.el6_10
  • H
Improper Input Validation

<0:67.0.3396.62-2.el6_9
  • H
Out-of-bounds Read

<0:67.0.3396.62-2.el6_9
  • H
Use After Free

<0:69.0.3497.81-1.el6_10
  • H
Improper Input Validation

<0:69.0.3497.81-1.el6_10
  • H
Out-of-bounds Read

<0:67.0.3396.62-2.el6_9
  • H
Improper Input Validation

<0:67.0.3396.62-2.el6_9
  • H
CRLF Injection

<0:67.0.3396.79-1.el6_9
  • H
Improper Input Validation

<0:67.0.3396.62-2.el6_9
  • H
Information Exposure

<0:67.0.3396.62-2.el6_9
  • H
CVE-2018-6135

<0:67.0.3396.62-2.el6_9
  • H
Out-of-bounds Write

<0:67.0.3396.62-2.el6_9
  • H
Out-of-bounds Read

<0:67.0.3396.62-2.el6_9
  • H
Information Exposure

<0:68.0.3440.75-1.el6_10
  • H
CVE-2018-6163

<0:68.0.3440.75-1.el6_10
  • H
Information Exposure

<0:67.0.3396.62-2.el6_9
  • C
Use After Free

<0:66.0.3359.117-1.el6_9
  • H
Information Exposure

<0:67.0.3396.62-2.el6_9
  • H
Cross-site Scripting (XSS)

<0:67.0.3396.62-2.el6_9
  • H
Out-of-bounds Read

<0:67.0.3396.62-2.el6_9
  • H
Out-of-bounds Write

<0:67.0.3396.62-2.el6_9
  • H
Out-of-bounds Write

<0:66.0.3359.170-1.el6_9
  • H
Incorrect Type Conversion or Cast

<0:67.0.3396.62-2.el6_9
  • H
Improper Input Validation

<0:66.0.3359.170-1.el6_9
  • C
Use After Free

<0:66.0.3359.139-1.el6_9
  • C
NULL Pointer Dereference

<0:66.0.3359.117-1.el6_9
  • C
CVE-2018-6107

<0:66.0.3359.117-1.el6_9
  • C
Improper Data Handling

<0:66.0.3359.117-1.el6_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:66.0.3359.170-1.el6_9
  • C
Improper Input Validation

<0:66.0.3359.117-1.el6_9
  • C
CVE-2018-6105

<0:66.0.3359.117-1.el6_9
  • C
Improper Input Validation

<0:66.0.3359.117-1.el6_9
  • C
Improper Input Validation

<0:66.0.3359.117-1.el6_9
  • C
CVE-2018-6098

<0:66.0.3359.117-1.el6_9
  • C
Integer Overflow or Wraparound

<0:66.0.3359.117-1.el6_9
  • C
Use After Free

<0:66.0.3359.117-1.el6_9
  • C
Use After Free

<0:66.0.3359.117-1.el6_9
  • C
Improper Input Validation

<0:66.0.3359.117-1.el6_9
  • C
Improper Input Validation

<0:66.0.3359.117-1.el6_9
  • C
Improper Input Validation

<0:66.0.3359.117-1.el6_9
  • C
Improper Data Handling

<0:66.0.3359.117-1.el6_9
  • C
Information Exposure

<0:66.0.3359.117-1.el6_9
  • H
Out-of-bounds Write

<0:67.0.3396.62-2.el6_9
  • H
Out-of-bounds Read

<0:67.0.3396.62-2.el6_9
  • H
Information Exposure

<0:65.0.3325.146-2.el6_9
  • H
Cross-site Scripting (XSS)

<0:65.0.3325.146-2.el6_9
  • C
Improper Input Validation

<0:66.0.3359.117-1.el6_9
  • H
Improper Data Handling

<0:67.0.3396.62-2.el6_9
  • C
Use of Incorrectly-Resolved Name or Reference

<0:66.0.3359.117-1.el6_9
  • C
Out-of-bounds Write

<0:66.0.3359.117-1.el6_9
  • C
Information Exposure

<0:66.0.3359.117-1.el6_9
  • C
Improper Input Validation

<0:66.0.3359.117-1.el6_9
  • C
Information Exposure

<0:66.0.3359.117-1.el6_9
  • H
CVE-2018-6125

<0:67.0.3396.62-2.el6_9
  • C
CVE-2018-6108

<0:66.0.3359.117-1.el6_9
  • H
Out-of-bounds Write

<0:65.0.3325.146-2.el6_9
  • C
Improper Data Handling

<0:66.0.3359.117-1.el6_9
  • H
Information Exposure

<0:65.0.3325.146-2.el6_9
  • H
Use of Uninitialized Resource

<0:67.0.3396.62-2.el6_9
  • C
Improper Data Handling

<0:66.0.3359.117-1.el6_9
  • H
Out-of-bounds Write

<0:65.0.3325.146-2.el6_9
  • H
Out-of-bounds Write

<0:65.0.3325.146-2.el6_9
  • H
Information Exposure

<0:65.0.3325.146-2.el6_9
  • C
Integer Overflow or Wraparound

<0:66.0.3359.117-1.el6_9
  • C
Improper Input Validation

<0:66.0.3359.117-1.el6_9
  • C
Information Exposure

<0:66.0.3359.117-1.el6_9
  • H
Use After Free

<0:67.0.3396.62-2.el6_9
  • H
Incorrect Type Conversion or Cast

<0:64.0.3282.167-1.el6_9
  • H
Improper Privilege Management

<0:65.0.3325.146-2.el6_9
  • H
Out-of-bounds Read

<0:65.0.3325.146-2.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Incorrect Type Conversion or Cast

<0:65.0.3325.146-2.el6_9
  • H
Out-of-bounds Read

<0:65.0.3325.146-2.el6_9
  • H
Out-of-bounds Write

<0:65.0.3325.146-2.el6_9
  • H
Information Exposure

<0:64.0.3282.119-1.el6_9
  • H
Out-of-bounds Read

<0:64.0.3282.119-1.el6_9
  • C
CVE-2018-6104

<0:66.0.3359.117-1.el6_9
  • C
Information Exposure

<0:66.0.3359.117-1.el6_9
  • H
Improper Input Validation

<0:65.0.3325.146-2.el6_9
  • H
Race Condition

<0:65.0.3325.146-2.el6_9
  • H
Cross-site Scripting (XSS)

<0:65.0.3325.146-2.el6_9
  • C
CVE-2018-6103

<0:66.0.3359.117-1.el6_9
  • H
Out-of-bounds Write

<0:65.0.3325.146-2.el6_9
  • H
CVE-2018-6083

<0:65.0.3325.146-2.el6_9
  • H
Information Exposure

<0:64.0.3282.119-1.el6_9
  • H
Information Exposure

<0:64.0.3282.119-1.el6_9
  • H
Use After Free

<0:65.0.3325.146-2.el6_9
  • H
Information Exposure

<0:65.0.3325.146-2.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Information Exposure

<0:64.0.3282.119-1.el6_9
  • H
Incorrect Permission Assignment for Critical Resource

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Use After Free

<0:64.0.3282.119-1.el6_9
  • H
Information Exposure

<0:64.0.3282.119-1.el6_9
  • C
Out-of-Bounds

<0:63.0.3239.84-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • C
Out-of-Bounds

<0:63.0.3239.84-1.el6_9
  • H
Incorrect Permission Assignment for Critical Resource

<0:65.0.3325.146-2.el6_9
  • C
Out-of-Bounds

<0:63.0.3239.84-1.el6_9
  • H
Use After Free

<0:64.0.3282.119-1.el6_9
  • C
Incorrect Type Conversion or Cast

<0:63.0.3239.84-1.el6_9
  • C
Use After Free

<0:63.0.3239.84-1.el6_9
  • H
Out-of-Bounds

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • C
Cryptographic Issues

<0:63.0.3239.84-1.el6_9
  • C
Use After Free

<0:63.0.3239.84-1.el6_9
  • C
Improper Input Validation

<0:63.0.3239.84-1.el6_9
  • C
Out-of-Bounds

<0:63.0.3239.84-1.el6_9
  • C
Out-of-bounds Write

<0:63.0.3239.84-1.el6_9
  • C
Out-of-Bounds

<0:63.0.3239.84-1.el6_9
  • H
Information Exposure

<0:65.0.3325.146-2.el6_9
  • C
Improper Input Validation

<0:63.0.3239.84-1.el6_9
  • H
Improper Input Validation

<0:65.0.3325.146-2.el6_9
  • H
Out-of-bounds Read

<0:65.0.3325.146-2.el6_9
  • H
Cross-site Scripting (XSS)

<0:65.0.3325.146-2.el6_9
  • C
Improper Input Validation

<0:63.0.3239.84-1.el6_9
  • C
Open Redirect

<0:63.0.3239.84-1.el6_9
  • H
Cross-site Scripting (XSS)

<0:64.0.3282.119-1.el6_9
  • C
Improper Input Validation

<0:63.0.3239.84-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:64.0.3282.119-1.el6_9
  • H
CVE-2018-6049

<0:64.0.3282.119-1.el6_9
  • H
Improper Input Validation

<0:62.0.3202.62-2.el6_9
  • H
CVE-2017-15391

<0:62.0.3202.62-2.el6_9
  • H
Cross-site Scripting (XSS)

<0:63.0.3239.108-1.el6_9
  • C
Cross-site Scripting (XSS)

<0:63.0.3239.84-1.el6_9
  • C
Out-of-Bounds

<0:63.0.3239.84-1.el6_9
  • H
Use After Free

<0:62.0.3202.62-2.el6_9
  • H
Incorrect Permission Assignment for Critical Resource

<0:61.0.3163.79-2.el6_9
  • C
Use After Free

<0:62.0.3202.89-1.el6_9
  • H
Use After Free

<0:62.0.3202.62-2.el6_9
  • H
Improper Input Validation

<0:62.0.3202.62-2.el6_9
  • H
Out-of-Bounds

<0:62.0.3202.62-2.el6_9
  • C
Out-of-Bounds

<0:62.0.3202.89-1.el6_9
  • H
Out-of-Bounds

<0:62.0.3202.75-1.el6_9
  • H
CVE-2017-15387

<0:62.0.3202.62-2.el6_9
  • H
Cross-site Scripting (XSS)

<0:62.0.3202.62-2.el6_9
  • H
Use After Free

<0:62.0.3202.62-2.el6_9
  • H
Incorrect Type Conversion or Cast

<0:61.0.3163.79-2.el6_9
  • H
Incorrect Type Conversion or Cast

<0:61.0.3163.79-2.el6_9
  • H
Improper Input Validation

<0:62.0.3202.62-2.el6_9
  • H
Exposure of Resource to Wrong Sphere

<0:62.0.3202.62-2.el6_9
  • H
Integer Overflow or Wraparound

<0:62.0.3202.62-2.el6_9
  • H
Use After Free

<0:62.0.3202.62-2.el6_9
  • H
Out-of-Bounds

<0:62.0.3202.62-2.el6_9
  • H
Improper Input Validation

<0:62.0.3202.62-2.el6_9
  • H
Improper Input Validation

<0:62.0.3202.62-2.el6_9
  • H
Out-of-bounds Write

<0:62.0.3202.62-2.el6_9
  • H
Out-of-Bounds

<0:62.0.3202.75-1.el6_9
  • H
Out-of-Bounds

<0:61.0.3163.79-2.el6_9
  • H
Out-of-Bounds

<0:61.0.3163.79-2.el6_9
  • H
CVE-2017-5120

<0:61.0.3163.79-2.el6_9
  • H
Use After Free

<0:61.0.3163.79-2.el6_9
  • H
Out-of-bounds Write

<0:62.0.3202.62-2.el6_9
  • H
Out-of-Bounds

<0:62.0.3202.62-2.el6_9
  • H
Improper Input Validation

<0:60.0.3112.78-1.el6_9
  • H
Information Exposure

<0:61.0.3163.79-2.el6_9
  • H
Improper Input Validation

<0:60.0.3112.78-1.el6_9
  • H
Out-of-bounds Read

<0:60.0.3112.78-1.el6_9
  • H
Out-of-bounds Read

<0:62.0.3202.62-2.el6_9
  • H
Use After Free

<0:60.0.3112.78-1.el6_9
  • H
Omission of Security-relevant Information

<0:60.0.3112.78-1.el6_9
  • H
Improper Input Validation

<0:60.0.3112.78-1.el6_9
  • H
Out-of-Bounds

<0:61.0.3163.100-1.el6_9
  • H
Out-of-Bounds

<0:61.0.3163.100-1.el6_9
  • H
Out-of-Bounds

<0:61.0.3163.79-2.el6_9
  • H
Out-of-Bounds

<0:61.0.3163.79-2.el6_9
  • H
Use After Free

<0:60.0.3112.78-1.el6_9
  • H
Information Exposure

<0:60.0.3112.78-1.el6_9
  • H
Information Exposure

<0:60.0.3112.78-1.el6_9
  • H
Use After Free

<0:60.0.3112.78-1.el6_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:60.0.3112.78-1.el6_9
  • H
Use After Free

<0:59.0.3071.104-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.104-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.86-1.el6_9
  • H
Improper Input Validation

<0:60.0.3112.78-1.el6_9
  • H
Incorrect Type Conversion or Cast

<0:60.0.3112.78-1.el6_9
  • H
Information Exposure

<0:60.0.3112.78-1.el6_9
  • H
Use After Free

<0:60.0.3112.78-1.el6_9
  • H
Information Exposure

<0:60.0.3112.78-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.86-1.el6_9
  • H
Out-of-bounds Write

<0:60.0.3112.78-1.el6_9
  • H
Information Exposure

<0:59.0.3071.86-1.el6_9
  • H
Use After Free

<0:59.0.3071.86-1.el6_9
  • H
CVE-2017-5078

<0:59.0.3071.86-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.86-1.el6_9
  • H
Incorrect Type Conversion or Cast

<0:59.0.3071.86-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.86-1.el6_9
  • H
Out-of-bounds Write

<0:60.0.3112.78-1.el6_9
  • H
Improper Input Validation

<0:60.0.3112.78-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.86-1.el6_9
  • H
Improper Input Validation

<0:60.0.3112.78-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.86-1.el6_9
  • H
Race Condition

<0:58.0.3029.96-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.86-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.104-1.el6_9
  • H
Out-of-bounds Read

<0:58.0.3029.81-1.el6_9
  • H
Cross-site Scripting (XSS)

<0:59.0.3071.86-1.el6_9
  • H
Use After Free

<0:58.0.3029.81-1.el6_9
  • H
Use After Free

<0:59.0.3071.86-1.el6_9
  • H
Use After Free

<0:59.0.3071.86-1.el6_9
  • H
Improper Input Validation

<0:58.0.3029.81-1.el6_9
  • H
Race Condition

<0:58.0.3029.81-1.el6_9
  • H
Improper Input Validation

<0:59.0.3071.86-1.el6_9
  • H
Improper Input Validation

<0:58.0.3029.81-1.el6_9
  • H
Out-of-bounds Read

<0:58.0.3029.81-1.el6_9
  • H
Use After Free

<0:58.0.3029.81-1.el6_9
  • H
Information Exposure

<0:59.0.3071.86-1.el6_9
  • H
Improper Input Validation

<0:58.0.3029.81-1.el6_9
  • H
Cross-site Scripting (XSS)

<0:58.0.3029.81-1.el6_9
  • H
Incorrect Type Conversion or Cast

<0:58.0.3029.81-1.el6_9
  • C
Out-of-bounds Read

<0:57.0.2987.133-1.el6_9
  • C
Out-of-bounds Read

<0:57.0.2987.133-1.el6_9
  • C
Out-of-bounds Read

<0:57.0.2987.133-1.el6_9
  • C
Out-of-Bounds

<0:57.0.2987.133-1.el6_9
  • C
Out-of-Bounds

<0:57.0.2987.133-1.el6_9
  • H
Improper Input Validation

<0:58.0.3029.81-1.el6_9
  • H
Out-of-Bounds

<0:58.0.3029.81-1.el6_9
  • H
Information Exposure

<0:57.0.2987.98-1.el6
  • H
Out-of-Bounds

<0:57.0.2987.98-1.el6
  • H
Improper Preservation of Permissions

<0:57.0.2987.98-1.el6
  • H
Out-of-bounds Write

<0:57.0.2987.98-1.el6
  • H
Integer Overflow or Wraparound

<0:57.0.2987.98-1.el6
  • H
Use After Free

<0:57.0.2987.98-1.el6
  • H
Improper Input Validation

<0:57.0.2987.98-1.el6
  • H
Use After Free

<0:57.0.2987.98-1.el6
  • H
Information Exposure

<0:57.0.2987.98-1.el6
  • H
Use After Free

<0:57.0.2987.98-1.el6
  • H
Cross-site Scripting (XSS)

<0:57.0.2987.98-1.el6
  • H
Out-of-bounds Write

<0:57.0.2987.98-1.el6
  • H
Missing Encryption of Sensitive Data

<0:57.0.2987.98-1.el6
  • H
Use After Free

<0:57.0.2987.98-1.el6
  • H
Information Exposure

<0:56.0.2924.76-1.el6
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:56.0.2924.76-1.el6
  • H
Information Exposure

<0:56.0.2924.76-1.el6
  • H
Out-of-Bounds

<0:56.0.2924.76-1.el6
  • H
Out-of-Bounds

<0:56.0.2924.76-1.el6
  • H
Out-of-Bounds

<0:56.0.2924.76-1.el6
  • H
Use After Free

<0:56.0.2924.76-1.el6
  • H
NULL Pointer Dereference

<0:56.0.2924.76-1.el6
  • H
CVE-2017-5022

<0:56.0.2924.76-1.el6
  • H
Cross-site Scripting (XSS)

<0:56.0.2924.76-1.el6
  • H
Race Condition

<0:57.0.2987.98-1.el6
  • H
Cross-site Scripting (XSS)

<0:56.0.2924.76-1.el6
  • H
Use After Free

<0:57.0.2987.98-1.el6
  • H
Use After Free

<0:57.0.2987.98-1.el6
  • H
Out-of-Bounds

<0:57.0.2987.98-1.el6
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:56.0.2924.76-1.el6
  • H
Out-of-Bounds

<0:56.0.2924.76-1.el6
  • H
Cross-site Scripting (XSS)

<0:56.0.2924.76-1.el6
  • H
CVE-2017-5013

<0:56.0.2924.76-1.el6
  • H
CVE-2017-5015

<0:56.0.2924.76-1.el6
  • H
Cross-site Scripting (XSS)

<0:56.0.2924.76-1.el6
  • H
Cross-site Scripting (XSS)

<0:56.0.2924.76-1.el6
  • H
Out-of-Bounds

<0:56.0.2924.76-1.el6
  • H
Integer Overflow or Wraparound

<0:55.0.2883.75-1.el6
  • H
Improper Data Handling

<0:55.0.2883.75-1.el6
  • H
Use After Free

<0:55.0.2883.75-1.el6
  • H
Information Exposure

<0:55.0.2883.75-1.el6
  • H
Cross-site Scripting (XSS)

<0:55.0.2883.75-1.el6
  • H
Use After Free

<0:55.0.2883.75-1.el6
  • H
Use After Free

<0:55.0.2883.75-1.el6
  • H
Cross-site Scripting (XSS)

<0:55.0.2883.75-1.el6
  • H
Out-of-Bounds

<0:54.0.2840.100-1.el6
  • H
Improper Input Validation

<0:55.0.2883.75-1.el6
  • H
Information Exposure

<0:54.0.2840.100-1.el6
  • H
Improper Access Control

<0:55.0.2883.75-1.el6
  • H
Improper Access Control

<0:55.0.2883.75-1.el6
  • H
Use After Free

<0:56.0.2924.76-1.el6
  • H
Use After Free

<0:55.0.2883.75-1.el6
  • H
Cross-site Scripting (XSS)

<0:56.0.2924.76-1.el6
  • H
Cross-site Scripting (XSS)

<0:55.0.2883.75-1.el6
  • H
Arbitrary Code Injection

<0:55.0.2883.75-1.el6
  • H
Incorrect Permission Assignment for Critical Resource

<0:54.0.2840.100-1.el6
  • H
Improper Data Handling

<0:55.0.2883.75-1.el6
  • H
Use After Free

<0:55.0.2883.75-1.el6
  • H
Information Exposure

<0:55.0.2883.75-1.el6
  • H
Use After Free

<0:55.0.2883.75-1.el6
  • H
Numeric Errors

<0:55.0.2883.75-1.el6
  • H
CVE-2016-5194

<0:54.0.2840.59-1.el6
  • H
Improper Input Validation

<0:54.0.2840.59-1.el6
  • H
Out-of-Bounds

<0:54.0.2840.100-1.el6
  • H
Improper Access Control

<0:54.0.2840.59-1.el6
  • H
Out-of-bounds Read

<0:54.0.2840.90-1.el6
  • H
Use After Free

<0:54.0.2840.59-1.el6
  • H
Improper Access Control

<0:54.0.2840.59-1.el6
  • H
Improper Input Validation

<0:54.0.2840.59-1.el6
  • H
Cross-site Scripting (XSS)

<0:55.0.2883.75-1.el6
  • H
Improper Data Handling

<0:55.0.2883.75-1.el6
  • H
Use After Free

<0:53.0.2785.113-1.el6
  • H
Out-of-bounds Write

<0:55.0.2883.75-1.el6
  • H
Improper Input Validation

<0:55.0.2883.75-1.el6
  • H
Integer Overflow or Wraparound

<0:55.0.2883.75-1.el6
  • H
CVE-2016-9652

<0:55.0.2883.75-1.el6
  • H
Use After Free

<0:53.0.2785.113-1.el6
  • H
Cross-site Scripting (XSS)

<0:53.0.2785.89-3.el6
  • H
Security Features

<0:53.0.2785.89-3.el6
  • H
Cross-site Scripting (XSS)

<0:55.0.2883.75-1.el6
  • H
Improper Access Control

<0:53.0.2785.113-1.el6
  • H
Improper Input Validation

<0:53.0.2785.113-1.el6
  • H
Out-of-bounds Write

<0:55.0.2883.75-1.el6
  • H
Security Features

<0:53.0.2785.89-3.el6
  • H
Security Features

<0:53.0.2785.89-3.el6
  • H
Incorrect Type Conversion or Cast

<0:53.0.2785.89-3.el6
  • H
NULL Pointer Dereference

<0:53.0.2785.113-1.el6
  • H
Out-of-Bounds

<0:53.0.2785.89-3.el6
  • H
Use After Free

<0:53.0.2785.89-3.el6
  • H
Out-of-Bounds

<0:53.0.2785.89-3.el6
  • H
Out-of-Bounds

<0:52.0.2743.116-1.el6
  • H
Use After Free

<0:54.0.2840.59-1.el6
  • H
Use After Free

<0:54.0.2840.59-1.el6
  • H
Security Features

<0:53.0.2785.89-3.el6
  • H
Out-of-bounds Read

<0:54.0.2840.59-1.el6
  • H
Improper Input Validation

<0:54.0.2840.59-1.el6
  • H
Information Exposure

<0:53.0.2785.113-1.el6
  • H
Use After Free

<0:53.0.2785.143-1.el6
  • H
Access Restriction Bypass

<0:52.0.2743.116-1.el6
  • H
Improper Input Validation

<0:53.0.2785.143-1.el6
  • H
CVE-2016-5146

<0:52.0.2743.116-1.el6
  • H
Security Features

<0:52.0.2743.116-1.el6
  • H
Security Features

<0:52.0.2743.82-1.el6
  • H
Improper Authentication

<0:52.0.2743.82-1.el6
  • H
Use After Free

<0:54.0.2840.59-1.el6
  • H
CVE-2016-5167

<0:53.0.2785.89-3.el6
  • H
Out-of-Bounds

<0:54.0.2840.59-1.el6
  • H
Cross-site Scripting (XSS)

<0:54.0.2840.59-1.el6
  • H
Out-of-Bounds

<0:52.0.2743.82-1.el6
  • H
Cross-site Scripting (XSS)

<0:54.0.2840.59-1.el6
  • H
Use After Free

<0:53.0.2785.89-3.el6
  • H
Use After Free

<0:53.0.2785.89-3.el6
  • H
Improper Authorization

<0:52.0.2743.82-1.el6
  • H
Improper Authorization

<0:52.0.2743.82-1.el6
  • H
Improper Input Validation

<0:52.0.2743.82-1.el6
  • H
Use After Free

<0:52.0.2743.82-1.el6
  • H
Improper Access Control

<0:53.0.2785.113-1.el6
  • H
CVE-2016-5175

<0:53.0.2785.113-1.el6
  • H
Information Exposure

<0:53.0.2785.89-3.el6
  • H
Cross-site Scripting (XSS)

<0:53.0.2785.89-3.el6
  • H
Integer Overflow or Wraparound

<0:53.0.2785.89-3.el6
  • H
Arbitrary Code Injection

<0:53.0.2785.89-3.el6
  • H
Cross-site Scripting (XSS)

<0:53.0.2785.89-3.el6
  • H
Cross-site Scripting (XSS)

<0:53.0.2785.89-3.el6
  • H
Improper Data Handling

<0:53.0.2785.89-3.el6
  • H
Information Exposure

<0:52.0.2743.82-1.el6
  • H
Security Features

<0:52.0.2743.82-1.el6
  • H
Use After Free

<0:52.0.2743.116-1.el6
  • H
Use After Free

<0:52.0.2743.82-1.el6
  • H
Out-of-Bounds

<0:52.0.2743.82-1.el6
  • H
CVE-2016-1705

<0:52.0.2743.82-1.el6
  • H
Improper Input Validation

<0:52.0.2743.116-1.el6
  • H
Improper Input Validation

<0:52.0.2743.82-1.el6
  • H
Improper Access Control

<0:52.0.2743.116-1.el6
  • H
Information Exposure

<0:52.0.2743.82-1.el6
  • H
Improper Access Control

<0:52.0.2743.82-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.79-1.el6
  • H
CVE-2016-1700

<0:51.0.2704.79-1.el6
  • H
Improper Access Control

<0:51.0.2704.79-1.el6
  • H
CVE-2016-1701

<0:51.0.2704.79-1.el6
  • H
Improper Access Control

<0:51.0.2704.63-1.el6
  • H
Improper Access Control

<0:51.0.2704.63-1.el6
  • H
Security Features

<0:51.0.2704.63-1.el6
  • H
CVE-2016-1703

<0:51.0.2704.79-1.el6
  • H
Information Exposure

<0:51.0.2704.79-1.el6
  • H
Use After Free

<0:52.0.2743.82-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.63-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.63-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.63-1.el6
  • H
Improper Access Control

<0:50.0.2661.102-1.el6
  • H
CVE-2016-1704

<0:51.0.2704.103-1.el6
  • H
Security Features

<0:51.0.2704.63-1.el6
  • H
Improper Access Control

<0:51.0.2704.63-1.el6
  • H
CVE-2016-1674

<0:51.0.2704.63-1.el6
  • H
Race Condition

<0:50.0.2661.102-1.el6
  • H
Improper Access Control

<0:51.0.2704.79-1.el6
  • H
Security Features

<0:51.0.2704.79-1.el6
  • H
Improper Access Control

<0:51.0.2704.63-1.el6
  • H
CVE-2016-1695

<0:51.0.2704.63-1.el6
  • H
Information Exposure

<0:51.0.2704.63-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.63-1.el6
  • H
CVE-2016-1690

<0:51.0.2704.63-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.63-1.el6
  • H
CVE-2016-1679

<0:51.0.2704.63-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.63-1.el6
  • H
Improper Access Control

<0:51.0.2704.63-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.63-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.63-1.el6
  • H
Information Exposure

<0:51.0.2704.63-1.el6
  • H
CVE-2016-1673

<0:51.0.2704.63-1.el6
  • H
Improper Access Control

<0:50.0.2661.102-1.el6
  • H
Integer Overflow or Wraparound

<0:50.0.2661.102-1.el6
  • H
CVE-2016-1666

<0:50.0.2661.94-1.el6
  • H
Security Features

<0:50.0.2661.94-1.el6
  • H
CVE-2016-1663

<0:50.0.2661.94-1.el6
  • H
Improper Input Validation

<0:50.0.2661.94-1.el6
  • H
Improper Input Validation

<0:50.0.2661.94-1.el6
  • H
Out-of-Bounds

<0:50.0.2661.75-1.el6
  • H
CVE-2016-1659

<0:50.0.2661.75-1.el6
  • H
Cross-site Scripting (XSS)

<0:50.0.2661.75-1.el6
  • H
CVE-2016-1662

<0:50.0.2661.94-1.el6
  • H
Improper Input Validation

<0:50.0.2661.94-1.el6
  • H
Out-of-bounds Read

<0:70.0.3538.67-1.el6_10
  • H
Information Exposure

<0:50.0.2661.75-1.el6
  • H
Security Features

<0:50.0.2661.75-1.el6
  • H
Improper Access Control

<0:50.0.2661.75-1.el6
  • H
Improper Input Validation

<0:50.0.2661.75-1.el6
  • H
Information Exposure

<0:50.0.2661.75-1.el6
  • H
CVE-2016-1655

<0:50.0.2661.75-1.el6
  • H
CVE-2016-1647

<0:49.0.2623.108-1.el6
  • H
Out-of-Bounds

<0:49.0.2623.108-1.el6
  • H
Out-of-Bounds

<0:49.0.2623.108-1.el6
  • H
CVE-2016-1648

<0:49.0.2623.108-1.el6
  • H
Use After Free

<0:49.0.2623.87-1.el6
  • H
Use After Free

<0:49.0.2623.75-1.el6
  • H
CVE-2016-3679

<0:49.0.2623.108-1.el6
  • H
Improper Input Validation

<0:49.0.2623.75-1.el6
  • H
CVE-2016-1642

<0:49.0.2623.75-1.el6
  • H
CVE-2016-1650

<0:49.0.2623.108-1.el6
  • H
Access Restriction Bypass

<0:49.0.2623.75-1.el6
  • H
Use After Free

<0:49.0.2623.75-1.el6
  • H
Information Exposure

<0:49.0.2623.75-1.el6
  • H
Code

<0:49.0.2623.75-1.el6
  • H
Out-of-Bounds

<0:48.0.2564.109-1.el6
  • H
Access Restriction Bypass

<0:48.0.2564.109-1.el6
  • H
Out-of-bounds Write

<0:49.0.2623.87-1.el6
  • H
CVE-2016-2843

<0:49.0.2623.75-1.el6
  • H
Information Exposure

<0:49.0.2623.75-1.el6
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

<0:48.0.2564.82-1.el6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:49.0.2623.87-1.el6
  • H
Use After Free

<0:49.0.2623.75-1.el6
  • H
Use After Free

<0:49.0.2623.75-1.el6
  • H
Access Restriction Bypass

<0:49.0.2623.75-1.el6
  • H
Out-of-bounds Read

<0:48.0.2564.109-1.el6
  • H
Information Exposure

<0:48.0.2564.82-1.el6
  • H
Out-of-bounds Read

<0:48.0.2564.82-1.el6
  • H
Incorrect Type Conversion or Cast

<0:48.0.2564.82-1.el6
  • H
Security Features

<0:48.0.2564.82-1.el6
  • H
Use After Free

<0:49.0.2623.75-1.el6
  • H
Access Restriction Bypass

<0:49.0.2623.75-1.el6
  • C
Access Restriction Bypass

<0:48.0.2564.116-1.el6
  • H
Improper Access Control

<0:49.0.2623.75-1.el6
  • H
Access Restriction Bypass

<0:48.0.2564.109-1.el6
  • H
Access Restriction Bypass

<0:49.0.2623.75-1.el6
  • H
Access Restriction Bypass

<0:48.0.2564.109-1.el6
  • H
Access Restriction Bypass

<0:48.0.2564.109-1.el6
  • H
Use After Free

<0:48.0.2564.82-1.el6
  • H
Out-of-Bounds

<0:48.0.2564.109-1.el6
  • H
Information Exposure

<0:48.0.2564.82-1.el6
  • H
Security Features

<0:48.0.2564.82-1.el6
  • H
CVE-2016-1620

<0:48.0.2564.82-1.el6
  • H
Use After Free

<0:47.0.2526.106-1.el6
  • H
CVE-2016-2051

<0:48.0.2564.82-1.el6
  • H
CVE-2015-6792

<0:47.0.2526.106-1.el6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:47.0.2526.80-1.el6
  • C
Access Restriction Bypass

<0:47.0.2526.73-1.el6
  • C
Use After Free

<0:47.0.2526.73-1.el6
  • C
CVE-2015-6787

<0:47.0.2526.73-1.el6
  • C
Integer Overflow or Wraparound

<0:47.0.2526.73-1.el6
  • C
Use After Free

<0:47.0.2526.73-1.el6
  • C
Access Restriction Bypass

<0:47.0.2526.73-1.el6
  • C
Out-of-Bounds

<0:47.0.2526.73-1.el6
  • C
Improper Input Validation

<0:47.0.2526.73-1.el6
  • C
Access Restriction Bypass

<0:47.0.2526.73-1.el6
  • C
Out-of-Bounds

<0:47.0.2526.73-1.el6
  • C
CVE-2015-8478

<0:47.0.2526.73-1.el6
  • C
Out-of-Bounds

<0:47.0.2526.73-1.el6
  • C
Use After Free

<0:47.0.2526.73-1.el6
  • C
Out-of-Bounds

<0:47.0.2526.73-1.el6
  • C
Access Restriction Bypass

<0:47.0.2526.73-1.el6
  • C
Access Restriction Bypass

<0:47.0.2526.73-1.el6
  • C
Use After Free

<0:47.0.2526.73-1.el6
  • C
Improper Input Validation

<0:47.0.2526.73-1.el6
  • C
Out-of-Bounds

<0:47.0.2526.73-1.el6
  • H
CVE-2015-8548

<0:47.0.2526.80-1.el6
  • H
Use After Free

<0:47.0.2526.80-1.el6
  • H
CVE-2015-6791

<0:47.0.2526.80-1.el6
  • H
Improper Input Validation

<0:47.0.2526.80-1.el6
  • C
Out-of-Bounds

<0:47.0.2526.73-1.el6
  • C
Out-of-Bounds

<0:47.0.2526.73-1.el6
  • C
Use After Free

<0:47.0.2526.73-1.el6
  • C
Access Restriction Bypass

<0:47.0.2526.73-1.el6
  • C
Access Restriction Bypass

<0:47.0.2526.73-1.el6
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<0:47.0.2526.73-1.el6
  • C
Use After Free

<0:47.0.2526.73-1.el6
  • H
Security Features

<0:46.0.2490.71-1.el6
  • H
Insufficient Verification of Data Authenticity

<0:46.0.2490.71-1.el6
  • H
Improper Access Control

<0:45.0.2454.101-1.el6
  • H
Information Exposure

<0:45.0.2454.101-1.el6
  • H
CVE-2015-1301

<0:45.0.2454.85-2.el6
  • H
Incorrect Type Conversion or Cast

<0:46.0.2490.71-1.el6
  • H
Security Features

<0:45.0.2454.85-2.el6
  • H
Use After Free

<0:45.0.2454.85-2.el6
  • H
Access Restriction Bypass

<0:45.0.2454.85-2.el6
  • H
Information Exposure

<0:46.0.2490.71-1.el6
  • H
Use After Free

<0:46.0.2490.71-1.el6
  • H
Use After Free

<0:46.0.2490.71-1.el6
  • H
Race Condition

<0:46.0.2490.71-1.el6
  • H
Code

<0:46.0.2490.71-1.el6
  • H
Access Restriction Bypass

<0:45.0.2454.85-2.el6
  • H
Information Exposure

<0:45.0.2454.85-2.el6
  • H
Security Features

<0:45.0.2454.85-2.el6
  • H
Security Features

<0:45.0.2454.85-2.el6
  • H
Use After Free

<0:45.0.2454.85-2.el6
  • H
Cross-site Scripting (XSS)

<0:44.0.2403.89-1.el6
  • H
Use After Free

<0:44.0.2403.89-1.el6
  • H
CVE-2015-6763

<0:46.0.2490.71-1.el6
  • H
Improper Access Control

<0:45.0.2454.101-1.el6
  • H
Use After Free

<0:45.0.2454.85-2.el6
  • H
Code

<0:44.0.2403.89-1.el6
  • H
Code

<0:44.0.2403.89-1.el6
  • H
Heap-based Buffer Overflow

<0:44.0.2403.89-1.el6
  • H
Use After Free

<0:44.0.2403.89-1.el6
  • H
Access Restriction Bypass

<0:45.0.2454.85-2.el6
  • H
Information Exposure

<0:44.0.2403.89-1.el6
  • H
Out-of-Bounds

<0:44.0.2403.89-1.el6
  • H
Use After Free

<0:44.0.2403.89-1.el6
  • H
Code

<0:44.0.2403.89-1.el6
  • H
Heap-based Buffer Overflow

<0:44.0.2403.89-1.el6
  • H
Heap-based Buffer Overflow

<0:44.0.2403.89-1.el6
  • H
CVE-2015-1289

<0:44.0.2403.89-1.el6
  • H
Heap-based Buffer Overflow

<0:44.0.2403.89-1.el6
  • H
Security Features

<0:44.0.2403.89-1.el6
  • H
Use After Free

<0:44.0.2403.89-1.el6
  • H
Use After Free

<0:44.0.2403.89-1.el6
  • H
Security Features

<0:44.0.2403.89-1.el6
  • H
Security Features

<0:44.0.2403.89-1.el6
  • H
Out-of-Bounds

<0:43.0.2357.65-1.el6_6
  • H
Security Features

<0:43.0.2357.130-1.el6_6
  • H
Security Features

<0:43.0.2357.130-1.el6_6
  • H
Security Features

<0:43.0.2357.130-1.el6_6
  • H
Access Restriction Bypass

<0:43.0.2357.65-1.el6_6
  • H
Security Features

<0:43.0.2357.130-1.el6_6
  • H
Use After Free

<0:43.0.2357.65-1.el6_6
  • H
Use After Free

<0:43.0.2357.65-1.el6_6
  • H
CVE-2015-1265

<0:43.0.2357.65-1.el6_6
  • H
Cross-site Scripting (XSS)

<0:43.0.2357.65-1.el6_6
  • H
Code

<0:43.0.2357.65-1.el6_6
  • H
Missing Initialization of a Variable

<0:43.0.2357.65-1.el6_6
  • H
Use After Free

<0:43.0.2357.65-1.el6_6
  • H
Missing Initialization of a Variable

<0:43.0.2357.65-1.el6_6
  • H
Use After Free

<0:42.0.2311.135-1.el6_6
  • H
CVE-2015-1250

<0:42.0.2311.135-1.el6_6
  • H
Use After Free

<0:42.0.2311.90-1.el6_6
  • H
Authentication Bypass by Primary Weakness

<0:42.0.2311.90-1.el6_6
  • H
Out-of-bounds Write

<0:42.0.2311.90-1.el6_6
  • H
Cross-site Request Forgery (CSRF)

<0:42.0.2311.90-1.el6_6
  • H
Out-of-bounds Read

<0:42.0.2311.90-1.el6_6
  • H
Authentication Bypass by Primary Weakness

<0:42.0.2311.90-1.el6_6
  • H
Use After Free

<0:42.0.2311.90-1.el6_6
  • H
Cross-site Request Forgery (CSRF)

<0:42.0.2311.90-1.el6_6
  • H
Improper Input Validation

<0:43.0.2357.65-1.el6_6
  • H
Use After Free

<0:43.0.2357.65-1.el6_6
  • H
Improper Access Control

<0:43.0.2357.65-1.el6_6
  • H
Out-of-Bounds

<0:43.0.2357.65-1.el6_6
  • C
Heap-based Buffer Overflow

<0:41.0.2272.118-1.el6_6
  • H
Out-of-bounds Read

<0:42.0.2311.90-1.el6_6
  • H
Out-of-bounds Write

<0:41.0.2272.76-1.el6_6
  • H
Cross-site Request Forgery (CSRF)

<0:42.0.2311.90-1.el6_6
  • H
Use After Free

<0:41.0.2272.76-1.el6_6
  • H
Improper Data Handling

<0:41.0.2272.76-1.el6_6
  • H
Integer Overflow or Wraparound

<0:41.0.2272.76-1.el6_6
  • H
Use After Free

<0:41.0.2272.76-1.el6_6
  • H
Use After Free

<0:41.0.2272.76-1.el6_6
  • H
Incorrect Type Conversion or Cast

<0:42.0.2311.90-1.el6_6
  • H
Heap-based Buffer Overflow

<0:42.0.2311.90-1.el6_6
  • H
Cross-site Request Forgery (CSRF)

<0:42.0.2311.90-1.el6_6
  • H
CVE-2015-1231

<0:41.0.2272.76-1.el6_6
  • H
Missing Initialization of a Variable

<0:41.0.2272.76-1.el6_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:41.0.2272.76-1.el6_6
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:41.0.2272.76-1.el6_6
  • H
Improper Input Validation

<0:41.0.2272.76-1.el6_6
  • H
Use After Free

<0:41.0.2272.76-1.el6_6
  • H
Missing Initialization of a Variable

<0:41.0.2272.76-1.el6_6
  • H
Out-of-Bounds

<0:40.0.2214.91-1.el6_6
  • H
Access Restriction Bypass

<0:40.0.2214.91-1.el6_6
  • H
Numeric Errors

<0:40.0.2214.91-1.el6_6
  • H
Out-of-bounds Read

<0:40.0.2214.91-1.el6_6
  • H
Out-of-bounds Read

<0:41.0.2272.76-1.el6_6
  • H
Out-of-bounds Read

<0:41.0.2272.76-1.el6_6
  • H
Out-of-bounds Write

<0:41.0.2272.76-1.el6_6
  • H
Improper Data Handling

<0:40.0.2214.91-1.el6_6
  • C
Heap-based Buffer Overflow

<0:41.0.2272.118-1.el6_6
  • H
CVE-2015-1346

<0:40.0.2214.91-1.el6_6
  • H
Out-of-bounds Read

<0:40.0.2214.91-1.el6_6
  • H
CVE-2015-1205

<0:40.0.2214.91-1.el6_6
  • H
Out-of-bounds Read

<0:40.0.2214.91-1.el6_6
  • H
CVE-2015-1210

<0:40.0.2214.111-1.el6_6
  • H
CVE-2015-1211

<0:40.0.2214.111-1.el6_6
  • H
Out-of-bounds Read

<0:40.0.2214.91-1.el6_6
  • H
Cryptographic Issues

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:41.0.2272.76-1.el6_6
  • H
Use After Free

<0:41.0.2272.76-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
Out-of-bounds Write

<0:41.0.2272.76-1.el6_6
  • H
Out-of-bounds Write

<0:41.0.2272.76-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
Code

<0:40.0.2214.91-1.el6_6
  • H
Numeric Errors

<0:39.0.2171.65-2.el6_6
  • H
Out-of-bounds Read

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
Missing Initialization of a Variable

<0:40.0.2214.91-1.el6_6
  • H
Out-of-bounds Read

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:40.0.2214.91-1.el6_6
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:39.0.2171.65-2.el6_6
  • H
Use After Free

<0:39.0.2171.65-2.el6_6
  • M
Buffer Overflow

*
  • C
Use After Free

<0:38.0.2125.101-2.el6_6
  • C
Resource Management Errors

<0:38.0.2125.101-2.el6_6
  • C
Use After Free

<0:38.0.2125.101-2.el6_6
  • C
Out-of-bounds Read

<0:38.0.2125.101-2.el6_6
  • C
Use After Free

<0:38.0.2125.101-2.el6_6
  • C
Out-of-bounds Read

<0:38.0.2125.101-2.el6_6
  • C
Information Exposure

<0:38.0.2125.101-2.el6_6
  • C
Arbitrary Code Injection

<0:38.0.2125.101-2.el6_6
  • C
Use After Free

<0:38.0.2125.101-2.el6_6
  • C
Resource Management Errors

<0:38.0.2125.101-2.el6_6
  • H
Out-of-bounds Write

<0:67.0.3396.62-2.el6_9
  • M
Inclusion of Functionality from Untrusted Control Sphere

*
  • H
Integer Overflow or Wraparound

<0:86.0.4240.111-1.el6_10
  • H
Integer Overflow or Wraparound

<0:53.0.2785.89-3.el6
  • H
Integer Overflow or Wraparound

<0:53.0.2785.89-3.el6
  • H
Integer Overflow or Wraparound

<0:52.0.2743.116-1.el6
  • H
Use After Free

<0:80.0.3987.87-1.el6_10
  • H
Out-of-bounds Read

<0:80.0.3987.87-1.el6_10
  • C
Use After Free

<0:86.0.4240.75-1.el6_10
  • H
Use After Free

<0:81.0.4044.122-1.el6_10
  • C
CVE-2020-6514

<0:84.0.4147.105-2.el6_10
  • H
Buffer Overflow

<0:81.0.4044.138-1.el6_10
  • H
NULL Pointer Dereference

<0:80.0.3987.87-1.el6_10
  • H
Improper Input Validation

<0:80.0.3987.87-1.el6_10
  • H
Out-of-bounds Read

<0:80.0.3987.149-1.el6_10
  • H
Integer Overflow or Wraparound

<0:80.0.3987.122-1.el6_10
  • C
Out-of-bounds Write

<0:79.0.3945.79-1.el6_10
  • H
Race Condition

*
  • H
CVE-2020-16020

*
  • M
Improper Restriction of Rendered UI Layers or Frames

*
  • M
Use After Free

*
  • H
Out-of-bounds Write

*
  • H
Use After Free

*
  • H
CVE-2020-16014

*
  • H
Out-of-bounds Write

*
  • M
Improper Restriction of Rendered UI Layers or Frames

*
  • M
Improper Restriction of Rendered UI Layers or Frames

*
  • H
CVE-2020-16022

*
  • H
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Missing Authorization

*
  • M
CVE-2020-16035

*
  • M
CVE-2020-16034

*
  • H
CVE-2020-16036

*
  • H
CVE-2020-16019

*
  • M
Missing Authorization

*
  • M
Cross-site Scripting (XSS)

*
  • M
Out-of-bounds Read

*
  • M
Files or Directories Accessible to External Parties

*
  • M
Resource Exhaustion

*
  • M
Out-of-bounds Read

*
  • C
Out-of-bounds Read

<0:79.0.3945.79-1.el6_10
  • C
Out-of-bounds Read

<0:79.0.3945.79-1.el6_10
  • H
Out-of-bounds Read

<0:73.0.3683.75-1.el6_10
  • H
Out-of-Bounds

<0:60.0.3112.78-1.el6_9
  • H
Use After Free

<0:71.0.3578.80-1.el6_10
  • C
Integer Overflow or Wraparound

<0:63.0.3239.84-1.el6_9
  • H
CVE-2016-1684

<0:51.0.2704.63-1.el6
  • H
CVE-2016-2052

<0:48.0.2564.82-1.el6
  • H
Out-of-Bounds

<0:51.0.2704.63-1.el6
  • M
CVE-2015-7834

*
  • H
Out-of-Bounds

<0:48.0.2564.82-1.el6
  • M
Integer Overflow or Wraparound

*
  • H
Out-of-bounds Read

<0:74.0.3729.131-1.el6_10
  • H
NULL Pointer Dereference

<0:80.0.3987.87-1.el6_10
  • H
Numeric Errors

<0:43.0.2357.65-1.el6_6
  • H
Improper Data Handling

<0:44.0.2403.89-1.el6
  • C
Improper Input Validation

<0:79.0.3945.79-1.el6_10
  • H
CVE-2015-1212

<0:40.0.2214.111-1.el6_6
  • C
Use of Uninitialized Resource

<0:79.0.3945.79-1.el6_10
  • H
Use After Free

<0:40.0.2214.111-1.el6_6
  • H
Out-of-Bounds

<0:40.0.2214.91-1.el6_6
  • H
Resource Management Errors

<0:40.0.2214.91-1.el6_6
  • H
Use After Free

<0:39.0.2171.65-2.el6_6
  • H
Heap-based Buffer Overflow

<0:40.0.2214.91-1.el6_6
  • H
Integer Overflow or Wraparound

<0:39.0.2171.65-2.el6_6
  • H
Out-of-Bounds

<0:39.0.2171.65-2.el6_6
  • H
Out-of-bounds Write

<0:40.0.2214.91-1.el6_6
  • H
CVE-2014-7910

<0:39.0.2171.65-2.el6_6
  • M
Integer Overflow or Wraparound

*
  • M
Stack-based Buffer Overflow

*
  • C
Use After Free

<0:38.0.2125.101-2.el6_6
  • C
CVE-2014-3200

<0:38.0.2125.101-2.el6_6
  • H
Integer Overflow or Wraparound

<0:70.0.3538.67-1.el6_10
  • C
Use After Free

<0:63.0.3239.84-1.el6_9
  • H
Use After Free

<0:52.0.2743.82-1.el6