httpd vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the httpd package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:2.4.6-99.el7_9.3
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-97.el7_9.1
  • H
NULL Pointer Dereference

<0:2.4.6-99.el7_9.2
  • H
Improper Encoding or Escaping of Output

<0:2.4.6-99.el7_9.2
  • H
Improper Encoding or Escaping of Output

<0:2.4.6-99.el7_9.2
  • H
HTTP Request Smuggling

<0:2.4.6-97.el7_9.5
  • H
Resource Exhaustion

<0:2.4.6-97.el7_9.4
  • H
Out-of-bounds Write

<0:2.4.6-97.el7_9.4
  • H
NULL Pointer Dereference

<0:2.4.6-97.el7_9.4
  • H
Out-of-Bounds

<0:2.4.6-97.el7_9.4
  • M
Missing Initialization of a Variable

<0:2.4.6-95.el7
  • M
Open Redirect

<0:2.4.6-95.el7
  • M
Open Redirect

<0:2.4.6-95.el7
  • M
Out-of-bounds Read

<0:2.4.6-95.el7
  • M
Improper Input Validation

<0:2.4.6-95.el7
  • M
Out-of-bounds Write

<0:2.4.6-95.el7
  • H
HTTP Response Splitting

<0:2.4.6-98.el7_9.7
  • M
Insufficient Session Expiration

<0:2.4.6-93.el7
  • M
Out-of-bounds Read

<0:2.4.6-93.el7
  • M
Out-of-bounds Write

<0:2.4.6-93.el7
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • M
Path Equivalence

<0:2.4.6-90.el7
  • M
Improper Access Control

<0:2.4.6-90.el7
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:2.4.6-90.el7_7.5
  • H
NULL Pointer Dereference

<0:2.4.6-90.el7_7.4
  • H
Improper Encoding or Escaping of Output

<0:2.4.6-90.el7_7.4
  • H
Improper Encoding or Escaping of Output

<0:2.4.6-90.el7_7.4
  • M
Improper Encoding or Escaping of Output

*
  • M
Improper Input Validation

*
  • L
HTTP Response Splitting

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
HTTP Response Splitting

*
  • H
HTTP Response Splitting

<0:2.4.6-98.el7_9.7
  • M
HTTP Response Splitting

*
  • M
HTTP Request Smuggling

*
  • M
Out-of-bounds Read

*
  • M
Insufficient Verification of Data Authenticity

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • M
HTTP Request Smuggling

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Initialization

*
  • H
HTTP Request Smuggling

<0:2.4.6-89.el7_6.4
  • H
HTTP Request Smuggling

<0:2.4.6-97.el7_9.5
  • H
HTTP Request Smuggling

<0:2.4.6-45.el7_3.8
  • H
HTTP Request Smuggling

<0:2.4.6-90.el7_7.3
  • H
HTTP Request Smuggling

<0:2.4.6-89.el7_6.4
  • H
HTTP Request Smuggling

<0:2.4.6-90.el7_7.3
  • H
HTTP Request Smuggling

<0:2.4.6-67.el7_4.9
  • H
HTTP Request Smuggling

<0:2.4.6-90.el7_7.3
  • H
HTTP Request Smuggling

<0:2.4.6-89.el7_6.4
  • M
Integer Overflow or Wraparound

*
  • H
Resource Exhaustion

<0:2.4.6-90.el7_7.3
  • H
Resource Exhaustion

<0:2.4.6-89.el7_6.4
  • H
Resource Exhaustion

<0:2.4.6-67.el7_4.9
  • H
Resource Exhaustion

<0:2.4.6-45.el7_3.8
  • H
Resource Exhaustion

<0:2.4.6-97.el7_9.4
  • H
Resource Exhaustion

<0:2.4.6-90.el7_7.3
  • H
Resource Exhaustion

<0:2.4.6-89.el7_6.4
  • H
Resource Exhaustion

<0:2.4.6-90.el7_7.3
  • H
Resource Exhaustion

<0:2.4.6-89.el7_6.4
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-45.el7_3.6
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-90.el7_7.1
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-89.el7_6.2
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-40.el7_2.7
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-89.el7_6.2
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-67.el7_4.7
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-97.el7_9.1
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-90.el7_7.1
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-89.el7_6.2
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.6-90.el7_7.1
  • H
Out-of-bounds Write

<0:2.4.6-97.el7_9.4
  • M
Out-of-bounds Read

*
  • H
NULL Pointer Dereference

<0:2.4.6-97.el7_9.4
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

<0:2.4.6-95.el7
  • M
Insufficient Session Expiration

<0:2.4.6-93.el7
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-45.el7_3.5
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-40.el7_2.6
  • H
Heap-based Buffer Overflow

<0:2.4.6-45.el7_3.5
  • H
Heap-based Buffer Overflow

<0:2.4.6-40.el7_2.6
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-45.el7_3.5
  • H
Heap-based Buffer Overflow

<0:2.4.6-45.el7_3.5
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-40.el7_2.6
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Heap-based Buffer Overflow

<0:2.4.6-40.el7_2.6
  • H
Heap-based Buffer Overflow

<0:2.4.6-67.el7_4.2
  • H
Use After Free

<0:2.4.6-45.el7_3.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • H
Use After Free

<0:2.4.6-40.el7_2.6
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • H
Use After Free

<0:2.4.6-40.el7_2.6
  • H
Use After Free

<0:2.4.6-40.el7_2.6
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • H
Use After Free

<0:2.4.6-45.el7_3.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • H
Use After Free

<0:2.4.6-45.el7_3.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • H
Use After Free

<0:2.4.6-40.el7_2.6
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • H
Use After Free

<0:2.4.6-45.el7_3.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • M
Use After Free

<0:2.4.6-67.el7_4.5
  • H
Missing Initialization of a Variable

<0:2.4.6-45.el7_3.5
  • H
Missing Initialization of a Variable

<0:2.4.6-40.el7_2.6
  • H
Missing Initialization of a Variable

<0:2.4.6-45.el7_3.5
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-40.el7_2.6
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-40.el7_2.6
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-45.el7_3.5
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

*
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-45.el7_3.5
  • H
Missing Initialization of a Variable

<0:2.4.6-40.el7_2.6
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Missing Initialization of a Variable

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-40.el7_2.6
  • H
Out-of-bounds Read

<0:2.4.6-40.el7_2.6
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-45.el7_3.5
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-40.el7_2.6
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-45.el7_3.5
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-45.el7_3.5
  • H
Out-of-bounds Read

<0:2.4.6-45.el7_3.5
  • H
Out-of-bounds Read

<0:2.4.6-40.el7_2.6
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • H
Out-of-bounds Read

<0:2.4.6-67.el7_4.2
  • M
Improper Authentication

*
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-45.el7_3.5
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-40.el7_2.6
  • H
Improper Authentication

<0:2.4.6-40.el7_2.6
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-40.el7_2.6
  • H
Improper Authentication

<0:2.4.6-45.el7_3.5
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-40.el7_2.6
  • H
Improper Authentication

<0:2.4.6-45.el7_3.5
  • H
Improper Authentication

<0:2.4.6-45.el7_3.5
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
Improper Authentication

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-45.el7_3.5
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-45.el7_3.5
  • H
NULL Pointer Dereference

<0:2.4.6-40.el7_2.6
  • H
NULL Pointer Dereference

<0:2.4.6-40.el7_2.6
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-40.el7_2.6
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-40.el7_2.6
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-45.el7_3.5
  • H
NULL Pointer Dereference

<0:2.4.6-67.el7_4.2
  • H
NULL Pointer Dereference

<0:2.4.6-45.el7_3.5
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Input Validation

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Improper Authentication

<0:2.4.6-45.el7_3.4
  • M
Open Redirect

<0:2.4.6-95.el7
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • H
Improper Input Validation

<0:2.4.6-40.el7_2.4
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Improper Authentication

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • M
Encoding Error

<0:2.4.6-31.el7_1.1
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
NULL Pointer Dereference

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • L
Improper Authentication

<0:2.4.6-31.el7
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Resource Management Errors

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Improper Synchronization

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Resource Exhaustion

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
Improper Input Validation

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • H
NULL Pointer Dereference

<0:2.4.6-18.el7_0
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.6-40.el7
  • M
Missing Initialization of a Variable

<0:2.4.6-95.el7
  • M
Open Redirect

<0:2.4.6-95.el7
  • M
Improper Access Control

<0:2.4.6-90.el7
  • M
Improper Access Control

<0:2.4.6-90.el7
  • M
Improper Access Control

<0:2.4.6-90.el7
  • M
Improper Access Control

<0:2.4.6-90.el7
  • M
Improper Access Control

<0:2.4.6-90.el7
  • M
Path Equivalence

<0:2.4.6-90.el7
  • M
Path Equivalence

<0:2.4.6-90.el7
  • M
Path Equivalence

<0:2.4.6-90.el7
  • M
Path Equivalence

<0:2.4.6-90.el7
  • M
Path Equivalence

<0:2.4.6-90.el7
  • H
Resource Exhaustion

*
  • M
Out-of-bounds Read

<0:2.4.6-95.el7
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • L
Authentication Bypass by Primary Weakness

<0:2.4.6-89.el7_6.1
  • M
Out-of-bounds Read

<0:2.4.6-93.el7
  • L
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Out-of-bounds Write

<0:2.4.6-95.el7
  • M
Out-of-bounds Write

<0:2.4.6-93.el7
  • M
Out-of-bounds Read

*
  • L
Uncontrolled Recursion

*
  • M
Improper Input Validation

*
  • H
Out-of-Bounds

<0:2.4.6-97.el7_9.4
  • M
NULL Pointer Dereference

*
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • M
HTTP Response Splitting

<0:2.4.6-45.el7_3.4
  • L
Out-of-Bounds

*
  • M
Improper Authentication

*
  • L
Access Restriction Bypass

*