ipa-server-dns vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ipa-server-dns package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Request Forgery (CSRF)

<0:4.6.8-5.el7_9.16
  • H
Use of Password Hash With Insufficient Computational Effort

<0:4.6.8-5.el7_9.17
  • M
Improper Authentication

<0:4.6.8-5.el7_9.10
  • H
Arbitrary Code Injection

<0:4.6.5-11.el7_7.4
  • H
Information Exposure Through Log Files

<0:4.6.5-11.el7_7.4
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • M
Resource Exhaustion

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7_9.4
  • H
Use of Password Hash With Insufficient Computational Effort

<0:4.6.8-5.el7_9.17
  • H
Incorrect Authorization

*
  • M
Improper Input Validation

*
  • M
Cross-site Request Forgery (CSRF)

<0:4.6.8-5.el7_9.16
  • M
Improper Authentication

<0:4.6.8-5.el7_9.10
  • M
Improper Input Validation

*
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • M
Resource Exhaustion

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7_9.4
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • H
Arbitrary Code Injection

<0:4.6.5-11.el7_7.4
  • H
Arbitrary Code Injection

<0:4.6.5-11.el7_7.4
  • H
Arbitrary Code Injection

<0:4.6.5-11.el7_7.4
  • H
Arbitrary Code Injection

<0:4.6.5-11.el7_7.4
  • H
Arbitrary Code Injection

<0:4.6.5-11.el7_7.4
  • H
Information Exposure Through Log Files

<0:4.6.5-11.el7_7.4
  • H
Information Exposure Through Log Files

<0:4.6.5-11.el7_7.4
  • H
Information Exposure Through Log Files

<0:4.6.5-11.el7_7.4
  • H
Information Exposure Through Log Files

<0:4.6.5-11.el7_7.4
  • H
Information Exposure Through Log Files

<0:4.6.5-11.el7_7.4
  • L
Information Exposure

*
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • L
Insufficient Session Expiration

*
  • M
Cross-site Scripting (XSS)

*