evolution-langpacks vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the evolution-langpacks package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-8.el7
  • M
Authentication Bypass

<0:3.28.5-8.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Directory Traversal

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Stack-based Buffer Overflow

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
NULL Pointer Dereference

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-8.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-Bounds

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Information Exposure

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Out-of-bounds Read

<0:3.28.5-2.el7
  • M
Authentication Bypass

<0:3.28.5-8.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
Improper Certificate Validation

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Buffer Overflow

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Uncontrolled Recursion

<0:3.28.5-2.el7
  • M
Information Exposure

*