389-ds-base-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the 389-ds-base-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Input Validation

<0:1.3.11.1-7.el7_9
  • L
Improper Authentication

<0:1.3.10.2-13.el7_9
  • M
Improper Authentication

<0:1.3.10.2-16.el7_9
  • M
Resource Exhaustion

<0:1.3.10.2-16.el7_9
  • L
Double Free

<0:1.3.10.2-15.el7_9
  • M
NULL Pointer Dereference

<0:1.3.10.2-17.el7_9
  • M
Information Exposure

<0:1.3.10.2-12.el7_9
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.3.9.1-12.el7_7
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Validation of Consistency within Input

<0:1.3.11.1-6.el7_9
  • H
Improper Input Validation

<0:1.3.11.1-5.el7_9
  • H
Improper Input Validation

<0:1.3.11.1-5.el7_9
  • H
Improper Input Validation

<0:1.3.11.1-5.el7_9
  • H
Improper Input Validation

<0:1.3.11.1-5.el7_9
  • M
Heap-based Buffer Overflow

*
  • M
NULL Pointer Dereference

<0:1.3.10.2-17.el7_9
  • M
Incorrect Authorization

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

<0:1.3.7.5-30.el7_5
  • M
Improper Authentication

<0:1.3.10.2-16.el7_9
  • M
Resource Exhaustion

<0:1.3.10.2-16.el7_9
  • L
Double Free

<0:1.3.10.2-15.el7_9
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Heap-based Buffer Overflow

<0:1.3.7.5-21.el7_5
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-26.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Buffer Overflow

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Improper Authentication

<0:1.3.6.1-28.el7_4
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • H
Out-of-Bounds

<0:1.3.5.10-20.el7_3
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Covert Timing Channel

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • M
Information Exposure

<0:1.3.5.10-11.el7
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Missing Release of Resource after Effective Lifetime

<0:1.3.4.0-26.el7_2
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Insufficient Comparison

<0:1.3.3.1-16.el7_1
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Insufficiently Protected Credentials

<0:1.3.3.1-13.el7
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • H
Missing Authorization

<0:1.3.1.6-26.el7_0
  • M
Information Exposure

<0:1.3.10.2-12.el7_9
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
Improper Initialization

<0:1.3.3.1-20.el7_1
  • M
NULL Pointer Dereference

*
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.3.9.1-12.el7_7
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.3.9.1-12.el7_7
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.3.9.1-12.el7_7
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.3.9.1-12.el7_7
  • H
Incorrect Permission Assignment for Critical Resource

<0:1.3.9.1-12.el7_7
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Missing Release of Resource after Effective Lifetime

<0:1.3.8.4-25.1.el7_6
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Improper Input Validation

<0:1.3.7.5-28.el7_5
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.8.4-15.el7
  • M
Resource Exhaustion

<0:1.3.7.5-29.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Race Condition

<0:1.3.7.5-28.el7_5
  • M
Cleartext Storage of Sensitive Information

*
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • M
Information Exposure

<0:1.3.6.1-19.el7_4
  • L
Heap-based Buffer Overflow

*
  • L
Improper Authentication

<0:1.3.10.2-13.el7_9