nss-util-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nss-util-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Improperly Implemented Security Check for Standard

<0:3.16.1-1.el6_5
  • C
Time-of-check Time-of-use (TOCTOU)

<0:3.16.1-1.el6_5
  • C
Cryptographic Issues

<0:3.16.1-1.el6_5
  • H
Numeric Errors

<0:3.15.3-1.el6_5
  • H
CVE-2013-1739

<0:3.15.3-1.el6_5
  • H
Access Restriction Bypass

<0:3.15.3-1.el6_5
  • H
Numeric Errors

<0:3.15.3-1.el6_5
  • H
Improper Input Validation

<0:3.15.3-1.el6_5
  • M
Out-of-Bounds

<0:3.14.3-3.el6_4
  • M
Cryptographic Issues

<0:3.14.3-3.el6_4
  • C
Out-of-bounds Write

<0:3.28.4-1.el6_9
  • M
CVE-2016-2834

<0:3.21.3-1.el6_8
  • M
Key Management Errors

<0:3.21.3-1.el6_8
  • M
NULL Pointer Dereference

<0:3.21.3-1.el6_8
  • H
CVE-2013-0743

<0:3.13.6-1.el6_3
  • M
CVE-2016-1979

<0:3.21.0-0.3.el6_7
  • M
CVE-2016-1978

<0:3.21.0-0.3.el6_7
  • C
Out-of-Bounds

<0:3.19.1-5.el6_7
  • M
Out-of-Bounds

<0:3.13.5-1.el6_3
  • C
Integer Overflow or Wraparound

<0:3.19.1-2.el6_7
  • C
Heap-based Buffer Overflow

<0:3.19.1-2.el6_7
  • C
Out-of-Bounds

<0:3.19.1-2.el6_7
  • M
Improperly Implemented Security Check for Standard

<0:3.19.1-1.el6_6
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.19.1-1.el6_6
  • H
Improper Verification of Cryptographic Signature

<0:3.16.1-2.el6_5
  • C
Encoding Error

<0:3.16.1-1.el6_5
  • L
Cryptographic Issues

<0:3.12.8-1.el6_0
  • C
Use After Free

<0:3.16.1-1.el6_5
  • L
CVE-2014-1569

<0:3.18.0-1.el6_6
  • C
Out-of-bounds Write

<0:3.16.1-1.el6_5
  • M
NULL Pointer Dereference

<0:3.44.0-1.el6_10