firefox vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the firefox package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Out-of-Bounds

<0:102.15.1-1.el8_6
  • H
Out-of-Bounds

<0:102.15.1-1.el8_4
  • H
Out-of-Bounds

<0:102.15.1-1.el8_4
  • H
Out-of-Bounds

<0:102.15.1-1.el8_2
  • H
Out-of-Bounds

<0:102.15.1-1.el8_2
  • H
Out-of-Bounds

<0:102.15.1-1.el8_6
  • H
Out-of-Bounds

<0:102.15.1-1.el8_6
  • H
Out-of-Bounds

<0:102.15.1-1.el8_8
  • H
Out-of-Bounds

<0:102.15.1-1.el8_8
  • H
Out-of-Bounds

<0:102.15.1-1.el8_6
  • H
Out-of-Bounds

<0:102.15.1-1.el8_8
  • H
Out-of-Bounds

<0:102.15.1-1.el8_8
  • H
Out-of-Bounds

<0:102.15.1-1.el8_4
  • H
Out-of-Bounds

<0:102.15.1-1.el8_1
  • H
Out-of-Bounds

<0:102.15.1-1.el8_8
  • H
Out-of-Bounds

<0:102.15.1-1.el8_2
  • H
Resource Exhaustion

<0:102.15.0-1.el8_2
  • H
Resource Exhaustion

<0:102.15.0-1.el8_1
  • H
Resource Exhaustion

<0:102.15.0-1.el8_2
  • H
Resource Exhaustion

<0:102.15.0-1.el8_8
  • H
Resource Exhaustion

<0:102.15.0-1.el8_8
  • H
Resource Exhaustion

<0:102.15.0-1.el8_8
  • H
Resource Exhaustion

<0:102.15.0-1.el8_8
  • H
Resource Exhaustion

<0:102.15.0-1.el8_6
  • H
Resource Exhaustion

<0:102.15.0-1.el8_8
  • H
Resource Exhaustion

<0:102.15.0-1.el8_6
  • H
Resource Exhaustion

<0:102.15.0-1.el8_6
  • H
Resource Exhaustion

<0:102.15.0-1.el8_6
  • H
Resource Exhaustion

<0:102.15.0-1.el8_4
  • H
Resource Exhaustion

<0:102.15.0-1.el8_4
  • H
Resource Exhaustion

<0:102.15.0-1.el8_4
  • H
Resource Exhaustion

<0:102.15.0-1.el8_2
  • H
Information Exposure

<0:102.15.0-1.el8_4
  • H
Information Exposure

<0:102.15.0-1.el8_4
  • H
Information Exposure

<0:102.15.0-1.el8_4
  • H
Information Exposure

<0:102.15.0-1.el8_6
  • H
Information Exposure

<0:102.15.0-1.el8_6
  • H
Information Exposure

<0:102.15.0-1.el8_2
  • H
Information Exposure

<0:102.15.0-1.el8_2
  • H
Information Exposure

<0:102.15.0-1.el8_1
  • H
Information Exposure

<0:102.15.0-1.el8_8
  • H
Information Exposure

<0:102.15.0-1.el8_8
  • H
Information Exposure

<0:102.15.0-1.el8_8
  • H
Information Exposure

<0:102.15.0-1.el8_6
  • H
Information Exposure

<0:102.15.0-1.el8_6
  • H
Information Exposure

<0:102.15.0-1.el8_8
  • H
Information Exposure

<0:102.15.0-1.el8_8
  • H
Information Exposure

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_4
  • H
Use After Free

<0:102.15.0-1.el8_1
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_4
  • H
Use After Free

<0:102.15.0-1.el8_4
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_4
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_4
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_6
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_6
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_2
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_6
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_4
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_2
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_1
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_6
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_4
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_4
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_4
  • H
Use After Free

<0:102.15.0-1.el8_1
  • H
Use After Free

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_1
  • H
Use After Free

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_2
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_4
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_4
  • H
Use After Free

<0:102.15.0-1.el8_4
  • H
Use After Free

<0:102.15.0-1.el8_6
  • H
Use After Free

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_4
  • H
Buffer Overflow

<0:102.15.0-1.el8_6
  • H
Buffer Overflow

<0:102.15.0-1.el8_4
  • H
Buffer Overflow

<0:102.15.0-1.el8_1
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_2
  • H
Buffer Overflow

<0:102.15.0-1.el8_4
  • H
Buffer Overflow

<0:102.15.0-1.el8_2
  • H
Buffer Overflow

<0:102.15.0-1.el8_6
  • H
Buffer Overflow

<0:102.15.0-1.el8_2
  • H
Buffer Overflow

<0:102.15.0-1.el8_6
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_6
  • H
Out-of-Bounds

<0:102.15.0-1.el8_6
  • H
Out-of-Bounds

<0:102.15.0-1.el8_2
  • H
Out-of-Bounds

<0:102.15.0-1.el8_2
  • H
Out-of-Bounds

<0:102.15.0-1.el8_4
  • H
Out-of-Bounds

<0:102.15.0-1.el8_4
  • H
Out-of-Bounds

<0:102.15.0-1.el8_4
  • H
Out-of-Bounds

<0:102.15.0-1.el8_1
  • H
Out-of-Bounds

<0:102.15.0-1.el8_8
  • H
Out-of-Bounds

<0:102.15.0-1.el8_6
  • H
Out-of-Bounds

<0:102.15.0-1.el8_6
  • H
Out-of-Bounds

<0:102.15.0-1.el8_6
  • H
Out-of-Bounds

<0:102.15.0-1.el8_8
  • H
Out-of-Bounds

<0:102.15.0-1.el8_8
  • H
Out-of-Bounds

<0:102.15.0-1.el8_8
  • H
Out-of-Bounds

<0:102.15.0-1.el8_2
  • H
Out-of-Bounds

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_2
  • H
Buffer Overflow

<0:102.15.0-1.el8_6
  • H
Buffer Overflow

<0:102.15.0-1.el8_6
  • H
Buffer Overflow

<0:102.15.0-1.el8_1
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_6
  • H
Buffer Overflow

<0:102.15.0-1.el8_6
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_2
  • H
Buffer Overflow

<0:102.15.0-1.el8_4
  • H
Buffer Overflow

<0:102.15.0-1.el8_2
  • H
Buffer Overflow

<0:102.15.0-1.el8_4
  • H
Buffer Overflow

<0:102.15.0-1.el8_4
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Buffer Overflow

<0:102.15.0-1.el8_8
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_8
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_2
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_8
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_6
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_4
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_8
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_6
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_2
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_8
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_6
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_6
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_1
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_4
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_2
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_4
  • H
Incorrect Behavior Order: Early Validation

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_4
  • H
Authentication Bypass

<0:102.15.0-1.el8_2
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_4
  • H
Authentication Bypass

<0:102.15.0-1.el8_6
  • H
Authentication Bypass

<0:102.15.0-1.el8_2
  • H
Authentication Bypass

<0:102.15.0-1.el8_2
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_6
  • H
Authentication Bypass

<0:102.15.0-1.el8_4
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_1
  • H
Authentication Bypass

<0:102.15.0-1.el8_6
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_6
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_6
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_6
  • H
Authentication Bypass

<0:102.15.0-1.el8_2
  • H
Authentication Bypass

<0:102.15.0-1.el8_2
  • H
Authentication Bypass

<0:102.15.0-1.el8_1
  • H
Authentication Bypass

<0:102.15.0-1.el8_8
  • H
Authentication Bypass

<0:102.15.0-1.el8_2
  • H
Authentication Bypass

<0:102.15.0-1.el8_6
  • H
Authentication Bypass

<0:102.15.0-1.el8_6
  • H
Authentication Bypass

<0:102.15.0-1.el8_4
  • H
Authentication Bypass

<0:102.15.0-1.el8_4
  • H
Authentication Bypass

<0:102.15.0-1.el8_4
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_6
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_6
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_8
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_8
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_1
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_2
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_8
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_6
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_6
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_8
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_4
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_4
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_2
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_2
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_8
  • H
Reliance on Cookies without Validation and Integrity Checking in a Security Decision

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_2
  • H
Buffer Overflow

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_1
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_2
  • H
Buffer Overflow

<0:102.14.0-1.el8_2
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_8
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_1
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_8
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_8
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_4
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_2
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_8
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_2
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_4
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_2
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_4
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.14.0-1.el8_8
  • H
Race Condition

<0:102.14.0-1.el8_8
  • H
Race Condition

<0:102.14.0-1.el8_2
  • H
Race Condition

<0:102.14.0-1.el8_6
  • H
Race Condition

<0:102.14.0-1.el8_6
  • H
Race Condition

<0:102.14.0-1.el8_2
  • H
Race Condition

<0:102.14.0-1.el8_2
  • H
Race Condition

<0:102.14.0-1.el8_6
  • H
Race Condition

<0:102.14.0-1.el8_8
  • H
Race Condition

<0:102.14.0-1.el8_8
  • H
Race Condition

<0:102.14.0-1.el8_6
  • H
Race Condition

<0:102.14.0-1.el8_8
  • H
Race Condition

<0:102.14.0-1.el8_4
  • H
Race Condition

<0:102.14.0-1.el8_1
  • H
Race Condition

<0:102.14.0-1.el8_4
  • H
Race Condition

<0:102.14.0-1.el8_4
  • H
Race Condition

<0:102.14.0-1.el8_8
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_2
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_8
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_8
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_4
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_8
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_2
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_6
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_1
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_8
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_8
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_2
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_4
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_4
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_6
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_6
  • H
Out-of-bounds Read

<0:102.14.0-1.el8_6
  • H
Improper Input Validation

<0:102.14.0-1.el8_4
  • H
Improper Input Validation

<0:102.14.0-1.el8_2
  • H
Improper Input Validation

<0:102.14.0-1.el8_6
  • H
Improper Input Validation

<0:102.14.0-1.el8_8
  • H
Improper Input Validation

<0:102.14.0-1.el8_6
  • H
Improper Input Validation

<0:102.14.0-1.el8_1
  • H
Improper Input Validation

<0:102.14.0-1.el8_4
  • H
Improper Input Validation

<0:102.14.0-1.el8_2
  • H
Improper Input Validation

<0:102.14.0-1.el8_6
  • H
Improper Input Validation

<0:102.14.0-1.el8_8
  • H
Improper Input Validation

<0:102.14.0-1.el8_2
  • H
Improper Input Validation

<0:102.14.0-1.el8_6
  • H
Improper Input Validation

<0:102.14.0-1.el8_8
  • H
Improper Input Validation

<0:102.14.0-1.el8_8
  • H
Improper Input Validation

<0:102.14.0-1.el8_8
  • H
Improper Input Validation

<0:102.14.0-1.el8_4
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_8
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_2
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_6
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_6
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_6
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_4
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_4
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_1
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_8
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_4
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_8
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_6
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_2
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_8
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_2
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_2
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_2
  • H
Buffer Overflow

<0:102.14.0-1.el8_2
  • H
Buffer Overflow

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_1
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_2
  • H
Buffer Overflow

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_2
  • H
Buffer Overflow

<0:102.14.0-1.el8_1
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_2
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_6
  • H
Buffer Overflow

<0:102.14.0-1.el8_4
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Buffer Overflow

<0:102.14.0-1.el8_8
  • H
Authentication Bypass

<0:102.13.0-2.el8_1
  • H
Authentication Bypass

<0:102.13.0-2.el8_4
  • H
Authentication Bypass

<0:102.13.0-2.el8_8
  • H
Authentication Bypass

<0:102.13.0-2.el8_2
  • H
Authentication Bypass

<0:102.13.0-2.el8_6
  • H
Authentication Bypass

<0:102.13.0-2.el8_6
  • H
Authentication Bypass

<0:102.13.0-2.el8_8
  • H
Authentication Bypass

<0:102.13.0-2.el8_4
  • H
Authentication Bypass

<0:102.13.0-2.el8_8
  • H
Authentication Bypass

<0:102.13.0-2.el8_8
  • H
Authentication Bypass

<0:102.13.0-2.el8_4
  • H
Authentication Bypass

<0:102.13.0-2.el8_2
  • H
Authentication Bypass

<0:102.13.0-2.el8_6
  • H
Authentication Bypass

<0:102.13.0-2.el8_8
  • H
Authentication Bypass

<0:102.13.0-2.el8_6
  • H
Authentication Bypass

<0:102.13.0-2.el8_2
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_2
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_6
  • H
Use After Free

<0:102.13.0-2.el8_4
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_4
  • H
Use After Free

<0:102.13.0-2.el8_2
  • H
Use After Free

<0:102.13.0-2.el8_4
  • H
Use After Free

<0:102.13.0-2.el8_1
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_2
  • H
Use After Free

<0:102.13.0-2.el8_6
  • H
Use After Free

<0:102.13.0-2.el8_6
  • H
Use After Free

<0:102.13.0-2.el8_6
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_2
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_6
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_6
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_2
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_2
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_8
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_4
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_6
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_4
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_4
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_6
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_1
  • H
Compilation with Insufficient Warnings or Errors

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_2
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_4
  • H
Use After Free

<0:102.13.0-2.el8_2
  • H
Use After Free

<0:102.13.0-2.el8_4
  • H
Use After Free

<0:102.13.0-2.el8_6
  • H
Use After Free

<0:102.13.0-2.el8_6
  • H
Use After Free

<0:102.13.0-2.el8_6
  • H
Use After Free

<0:102.13.0-2.el8_1
  • H
Use After Free

<0:102.13.0-2.el8_6
  • H
Use After Free

<0:102.13.0-2.el8_2
  • H
Use After Free

<0:102.13.0-2.el8_8
  • H
Use After Free

<0:102.13.0-2.el8_4
  • H
Buffer Overflow

<0:102.13.0-2.el8_8
  • H
Buffer Overflow

<0:102.13.0-2.el8_8
  • H
Buffer Overflow

<0:102.13.0-2.el8_4
  • H
Buffer Overflow

<0:102.13.0-2.el8_6
  • H
Buffer Overflow

<0:102.13.0-2.el8_4
  • H
Buffer Overflow

<0:102.13.0-2.el8_8
  • H
Buffer Overflow

<0:102.13.0-2.el8_1
  • H
Buffer Overflow

<0:102.13.0-2.el8_8
  • H
Buffer Overflow

<0:102.13.0-2.el8_2
  • H
Buffer Overflow

<0:102.13.0-2.el8_6
  • H
Buffer Overflow

<0:102.13.0-2.el8_2
  • H
Buffer Overflow

<0:102.13.0-2.el8_4
  • H
Buffer Overflow

<0:102.13.0-2.el8_8
  • H
Buffer Overflow

<0:102.13.0-2.el8_6
  • H
Buffer Overflow

<0:102.13.0-2.el8_6
  • H
Buffer Overflow

<0:102.13.0-2.el8_2
  • M
Resource Exhaustion

*
  • H
Buffer Overflow

<0:102.12.0-1.el8_8
  • H
Buffer Overflow

<0:102.12.0-1.el8_1
  • H
Buffer Overflow

<0:102.12.0-1.el8_6
  • H
Buffer Overflow

<0:102.12.0-1.el8_8
  • H
Buffer Overflow

<0:102.12.0-1.el8_4
  • H
Buffer Overflow

<0:102.12.0-1.el8_6
  • H
Buffer Overflow

<0:102.12.0-1.el8_6
  • H
Buffer Overflow

<0:102.12.0-1.el8_4
  • H
Buffer Overflow

<0:102.12.0-1.el8_2
  • H
Buffer Overflow

<0:102.12.0-1.el8_4
  • H
Buffer Overflow

<0:102.12.0-1.el8_8
  • H
Buffer Overflow

<0:102.12.0-1.el8_8
  • H
Buffer Overflow

<0:102.12.0-1.el8_8
  • H
Buffer Overflow

<0:102.12.0-1.el8_2
  • H
Buffer Overflow

<0:102.12.0-1.el8_6
  • H
Buffer Overflow

<0:102.12.0-1.el8_2
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_2
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_4
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_2
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_8
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_1
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_8
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_8
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_4
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_6
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_2
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_8
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_8
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_6
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_4
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_6
  • H
The UI Performs the Wrong Action

<0:102.12.0-1.el8_6
  • H
Buffer Overflow

<0:102.11.0-2.el8_2
  • H
Buffer Overflow

<0:102.11.0-2.el8_6
  • H
Buffer Overflow

<0:102.11.0-2.el8_7
  • H
Buffer Overflow

<0:102.11.0-2.el8_6
  • H
Buffer Overflow

<0:102.11.0-2.el8_4
  • H
Buffer Overflow

<0:102.11.0-2.el8_2
  • H
Buffer Overflow

<0:102.11.0-2.el8_7
  • H
Buffer Overflow

<0:102.11.0-2.el8_2
  • H
Buffer Overflow

<0:102.11.0-2.el8_7
  • H
Buffer Overflow

<0:102.11.0-2.el8_1
  • H
Buffer Overflow

<0:102.11.0-2.el8_7
  • H
Buffer Overflow

<0:102.11.0-2.el8_7
  • H
Buffer Overflow

<0:102.11.0-2.el8_4
  • H
Buffer Overflow

<0:102.11.0-2.el8_6
  • H
Buffer Overflow

<0:102.11.0-2.el8_4
  • H
Buffer Overflow

<0:102.11.0-2.el8_4
  • H
Buffer Overflow

<0:102.11.0-2.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_4
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_7
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_7
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_4
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_7
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_7
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_2
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_2
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_6
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_4
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_1
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_4
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_7
  • H
Improper Handling of Insufficient Permissions or Privileges

<0:102.11.0-2.el8_2
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_4
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_7
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_6
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_6
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_4
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_4
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_1
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_4
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_6
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_6
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_2
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_7
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_2
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_7
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_7
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_7
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:102.11.0-2.el8_2
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_4
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_6
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_6
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_2
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_7
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_2
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_6
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_4
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_1
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_7
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_7
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_4
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_2
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_4
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_6
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_7
  • H
Use of Uninitialized Variable

<0:102.11.0-2.el8_7
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_2
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_6
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_6
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_7
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_7
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_2
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_7
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_2
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_6
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_4
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_4
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_6
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_4
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_7
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_7
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_1
  • H
Out-of-bounds Read

<0:102.11.0-2.el8_4
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_4
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_7
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_6
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_6
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_2
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_7
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_2
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_6
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_2
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_7
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_4
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_7
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_1
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_4
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_6
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_7
  • H
Insufficient Verification of Data Authenticity

<0:102.11.0-2.el8_4
  • H
Resource Exhaustion

<0:102.11.0-2.el8_7
  • H
Resource Exhaustion

<0:102.11.0-2.el8_4
  • H
Resource Exhaustion

<0:102.11.0-2.el8_4
  • H
Resource Exhaustion

<0:102.11.0-2.el8_6
  • H
Resource Exhaustion

<0:102.11.0-2.el8_7
  • H
Resource Exhaustion

<0:102.11.0-2.el8_2
  • H
Resource Exhaustion

<0:102.11.0-2.el8_6
  • H
Resource Exhaustion

<0:102.11.0-2.el8_4
  • H
Resource Exhaustion

<0:102.11.0-2.el8_7
  • H
Resource Exhaustion

<0:102.11.0-2.el8_4
  • H
Resource Exhaustion

<0:102.11.0-2.el8_1
  • H
Resource Exhaustion

<0:102.11.0-2.el8_2
  • H
Resource Exhaustion

<0:102.11.0-2.el8_2
  • H
Resource Exhaustion

<0:102.11.0-2.el8_7
  • H
Resource Exhaustion

<0:102.11.0-2.el8_7
  • H
Resource Exhaustion

<0:102.11.0-2.el8_6
  • H
Resource Exhaustion

<0:102.11.0-2.el8_6
  • H
Double Free

<0:102.10.0-1.el8_1
  • H
Double Free

<0:102.10.0-1.el8_7
  • H
Double Free

<0:102.10.0-1.el8_2
  • H
Double Free

<0:102.10.0-1.el8_2
  • H
Double Free

<0:102.10.0-1.el8_2
  • H
Double Free

<0:102.10.0-1.el8_4
  • H
Double Free

<0:102.10.0-1.el8_4
  • H
Double Free

<0:102.10.0-1.el8_4
  • H
Double Free

<0:102.10.0-1.el8_4
  • H
Double Free

<0:102.10.0-1.el8_6
  • H
Double Free

<0:102.10.0-1.el8_6
  • H
Double Free

<0:102.10.0-1.el8_6
  • H
Double Free

<0:102.10.0-1.el8_6
  • H
Double Free

<0:102.10.0-1.el8_7
  • H
Double Free

<0:102.10.0-1.el8_7
  • H
Double Free

<0:102.10.0-1.el8_7
  • H
Double Free

<0:102.10.0-1.el8_7
  • H
Incorrect Calculation

<0:102.10.0-1.el8_4
  • H
Incorrect Calculation

<0:102.10.0-1.el8_2
  • H
Incorrect Calculation

<0:102.10.0-1.el8_2
  • H
Incorrect Calculation

<0:102.10.0-1.el8_2
  • H
Incorrect Calculation

<0:102.10.0-1.el8_1
  • H
Incorrect Calculation

<0:102.10.0-1.el8_7
  • H
Incorrect Calculation

<0:102.10.0-1.el8_7
  • H
Incorrect Calculation

<0:102.10.0-1.el8_7
  • H
Incorrect Calculation

<0:102.10.0-1.el8_6
  • H
Incorrect Calculation

<0:102.10.0-1.el8_6
  • H
Incorrect Calculation

<0:102.10.0-1.el8_7
  • H
Incorrect Calculation

<0:102.10.0-1.el8_4
  • H
Incorrect Calculation

<0:102.10.0-1.el8_6
  • H
Incorrect Calculation

<0:102.10.0-1.el8_4
  • H
Incorrect Calculation

<0:102.10.0-1.el8_6
  • H
Incorrect Calculation

<0:102.10.0-1.el8_4
  • H
Incorrect Calculation

<0:102.10.0-1.el8_7
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_7
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_7
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_7
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_2
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_2
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_2
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_1
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_4
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_7
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_4
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_6
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_6
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_6
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_7
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_6
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_4
  • H
Direct Request ('Forced Browsing')

<0:102.10.0-1.el8_4
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_2
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_2
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_2
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_6
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_4
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_7
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_6
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_6
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_6
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_7
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_4
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_4
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_7
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_7
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_7
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_1
  • H
Failure to Sanitize Special Element

<0:102.10.0-1.el8_4
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_6
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_4
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_6
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_4
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_7
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_2
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_2
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_2
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_7
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_7
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_1
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_4
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_7
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_6
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_7
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_4
  • H
Unrestricted Upload of File with Dangerous Type

<0:102.10.0-1.el8_6
  • H
Buffer Overflow

<0:102.10.0-1.el8_7
  • H
Buffer Overflow

<0:102.10.0-1.el8_7
  • H
Buffer Overflow

<0:102.10.0-1.el8_1
  • H
Buffer Overflow

<0:102.10.0-1.el8_4
  • H
Buffer Overflow

<0:102.10.0-1.el8_4
  • H
Buffer Overflow

<0:102.10.0-1.el8_6
  • H
Buffer Overflow

<0:102.10.0-1.el8_7
  • H
Buffer Overflow

<0:102.10.0-1.el8_4
  • H
Buffer Overflow

<0:102.10.0-1.el8_7
  • H
Buffer Overflow

<0:102.10.0-1.el8_6
  • H
Buffer Overflow

<0:102.10.0-1.el8_6
  • H
Buffer Overflow

<0:102.10.0-1.el8_4
  • H
Buffer Overflow

<0:102.10.0-1.el8_7
  • H
Buffer Overflow

<0:102.10.0-1.el8_2
  • H
Buffer Overflow

<0:102.10.0-1.el8_2
  • H
Buffer Overflow

<0:102.10.0-1.el8_2
  • H
Buffer Overflow

<0:102.10.0-1.el8_6
  • H
Reachable Assertion

<0:102.10.0-1.el8_4
  • H
Reachable Assertion

<0:102.10.0-1.el8_1
  • H
Reachable Assertion

<0:102.10.0-1.el8_4
  • H
Reachable Assertion

<0:102.10.0-1.el8_6
  • H
Reachable Assertion

<0:102.10.0-1.el8_6
  • H
Reachable Assertion

<0:102.10.0-1.el8_7
  • H
Reachable Assertion

<0:102.10.0-1.el8_7
  • H
Reachable Assertion

<0:102.10.0-1.el8_7
  • H
Reachable Assertion

<0:102.10.0-1.el8_2
  • H
Reachable Assertion

<0:102.10.0-1.el8_2
  • H
Reachable Assertion

<0:102.10.0-1.el8_2
  • H
Reachable Assertion

<0:102.10.0-1.el8_7
  • H
Reachable Assertion

<0:102.10.0-1.el8_4
  • H
Reachable Assertion

<0:102.10.0-1.el8_6
  • H
Reachable Assertion

<0:102.10.0-1.el8_6
  • H
Reachable Assertion

<0:102.10.0-1.el8_4
  • H
Reachable Assertion

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_4
  • H
Out-of-Bounds

<0:102.10.0-1.el8_4
  • H
Out-of-Bounds

<0:102.10.0-1.el8_4
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_1
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_6
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_2
  • H
Out-of-Bounds

<0:102.10.0-1.el8_2
  • H
Out-of-Bounds

<0:102.10.0-1.el8_2
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_4
  • H
Out-of-Bounds

<0:102.10.0-1.el8_6
  • H
Out-of-Bounds

<0:102.10.0-1.el8_6
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_6
  • H
Out-of-Bounds

<0:102.10.0-1.el8_4
  • H
Out-of-Bounds

<0:102.10.0-1.el8_4
  • H
Out-of-Bounds

<0:102.10.0-1.el8_1
  • H
Out-of-Bounds

<0:102.10.0-1.el8_6
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_4
  • H
Out-of-Bounds

<0:102.10.0-1.el8_6
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • H
Out-of-Bounds

<0:102.10.0-1.el8_2
  • H
Out-of-Bounds

<0:102.10.0-1.el8_2
  • H
Out-of-Bounds

<0:102.10.0-1.el8_2
  • H
Out-of-Bounds

<0:102.10.0-1.el8_4
  • H
Out-of-Bounds

<0:102.10.0-1.el8_6
  • H
Out-of-Bounds

<0:102.10.0-1.el8_6
  • H
Out-of-Bounds

<0:102.10.0-1.el8_7
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-4.el8_2
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-3.el8_7
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-3.el8_7
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-3.el8_6
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-4.el8_4
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-3.el8_7
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-3.el8_7
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-3.el8_6
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-3.el8_6
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-4.el8_4
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-4.el8_1
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-3.el8_6
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-4.el8_2
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-4.el8_2
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-3.el8_7
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-4.el8_4
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:102.9.0-4.el8_4
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-4.el8_4
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-4.el8_4
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.el8_7
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.el8_7
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.el8_6
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-4.el8_4
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-4.el8_1
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-4.el8_4
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.el8_6
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.el8_7
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.el8_7
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.el8_7
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-4.el8_2
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-4.el8_2
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.el8_6
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-3.el8_6
  • H
Incorrect Type Conversion or Cast

<0:102.9.0-4.el8_2
  • H
Out-of-bounds Read

<0:102.9.0-3.el8_6
  • H
Out-of-bounds Read

<0:102.9.0-3.el8_6
  • H
Out-of-bounds Read

<0:102.9.0-3.el8_6
  • H
Out-of-bounds Read

<0:102.9.0-3.el8_7
  • H
Out-of-bounds Read

<0:102.9.0-3.el8_7
  • H
Out-of-bounds Read

<0:102.9.0-3.el8_7
  • H
Out-of-bounds Read

<0:102.9.0-3.el8_7
  • H
Out-of-bounds Read

<0:102.9.0-4.el8_4
  • H
Out-of-bounds Read

<0:102.9.0-4.el8_4
  • H
Out-of-bounds Read

<0:102.9.0-4.el8_4
  • H
Out-of-bounds Read

<0:102.9.0-4.el8_1
  • H
Out-of-bounds Read

<0:102.9.0-3.el8_6
  • H
Out-of-bounds Read

<0:102.9.0-4.el8_2
  • H
Out-of-bounds Read

<0:102.9.0-3.el8_7
  • H
Out-of-bounds Read

<0:102.9.0-4.el8_2
  • H
Out-of-bounds Read

<0:102.9.0-4.el8_2
  • H
Out-of-bounds Read

<0:102.9.0-4.el8_4
  • H
Buffer Overflow

<0:102.9.0-3.el8_6
  • H
Buffer Overflow

<0:102.9.0-3.el8_7
  • H
Buffer Overflow

<0:102.9.0-3.el8_6
  • H
Buffer Overflow

<0:102.9.0-3.el8_7
  • H
Buffer Overflow

<0:102.9.0-3.el8_6
  • H
Buffer Overflow

<0:102.9.0-3.el8_6
  • H
Buffer Overflow

<0:102.9.0-3.el8_7
  • H
Buffer Overflow

<0:102.9.0-3.el8_7
  • H
Buffer Overflow

<0:102.9.0-3.el8_7
  • H
Buffer Overflow

<0:102.9.0-4.el8_2
  • H
Buffer Overflow

<0:102.9.0-4.el8_2
  • H
Buffer Overflow

<0:102.9.0-4.el8_2
  • H
Buffer Overflow

<0:102.9.0-4.el8_4
  • H
Buffer Overflow

<0:102.9.0-4.el8_4
  • H
Buffer Overflow

<0:102.9.0-4.el8_4
  • H
Buffer Overflow

<0:102.9.0-4.el8_4
  • H
Buffer Overflow

<0:102.9.0-4.el8_1
  • H
Arbitrary Code Injection

<0:102.9.0-4.el8_4
  • H
Arbitrary Code Injection

<0:102.9.0-3.el8_6
  • H
Arbitrary Code Injection

<0:102.9.0-4.el8_1
  • H
Arbitrary Code Injection

<0:102.9.0-3.el8_7
  • H
Arbitrary Code Injection

<0:102.9.0-4.el8_2
  • H
Arbitrary Code Injection

<0:102.9.0-4.el8_2
  • H
Arbitrary Code Injection

<0:102.9.0-3.el8_7
  • H
Arbitrary Code Injection

<0:102.9.0-4.el8_4
  • H
Arbitrary Code Injection

<0:102.9.0-4.el8_4
  • H
Arbitrary Code Injection

<0:102.9.0-3.el8_6
  • H
Arbitrary Code Injection

<0:102.9.0-3.el8_7
  • H
Arbitrary Code Injection

<0:102.9.0-3.el8_7
  • H
Arbitrary Code Injection

<0:102.9.0-3.el8_7
  • H
Arbitrary Code Injection

<0:102.9.0-3.el8_6
  • H
Arbitrary Code Injection

<0:102.9.0-3.el8_6
  • H
Arbitrary Code Injection

<0:102.9.0-4.el8_2
  • H
Arbitrary Code Injection

<0:102.9.0-4.el8_4
  • H
Use After Free

<0:102.8.0-2.el8_7
  • H
Use After Free

<0:102.8.0-2.el8_4
  • H
Use After Free

<0:102.8.0-2.el8_6
  • H
Use After Free

<0:102.8.0-2.el8_4
  • H
Use After Free

<0:102.8.0-2.el8_6
  • H
Use After Free

<0:102.8.0-2.el8_6
  • H
Use After Free

<0:102.8.0-2.el8_4
  • H
Use After Free

<0:102.8.0-2.el8_4
  • H
Use After Free

<0:102.8.0-2.el8_7
  • H
Use After Free

<0:102.8.0-2.el8_7
  • H
Use After Free

<0:102.8.0-2.el8_7
  • H
Use After Free

<0:102.8.0-2.el8_2
  • H
Use After Free

<0:102.8.0-2.el8_2
  • H
Use After Free

<0:102.8.0-2.el8_2
  • H
Use After Free

<0:102.8.0-2.el8_7
  • H
Use After Free

<0:102.8.0-2.el8_6
  • H
Use After Free

<0:102.8.0-2.el8_1
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_2
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_2
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_2
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_6
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_6
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_6
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_7
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_4
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_4
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_7
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_7
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_7
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_1
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_4
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_7
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_4
  • H
Improper Handling of Alternate Encoding

<0:102.8.0-2.el8_6
  • H
Insufficient UI Warning of Dangerous Operations

<0:102.8.0-2.el8_2
  • H
Insufficient UI Warning of Dangerous Operations

<0:102.8.0-2.el8_1
  • H
Insufficient UI Warning of Dangerous Operations

<0:102.8.0-2.el8_4
  • H
Insufficient UI Warning of Dangerous Operations

<0:102.8.0-2.el8_7
  • H
Insufficient UI Warning of Dangerous Operations

<0:102.8.0-2.el8_2
  • H
Insufficient UI Warning of Dangerous Operations

<0:102.8.0-2.el8_4
  • H
Insufficient UI Warning of Dangerous Operations

<0:102.8.0-2.el8_6
  • H
Insufficient UI Warning of Dangerous Operations

<0:102.8.0-2.el8_4
  • H
Insufficient UI Warning of Dangerous Operations

<0:102.8.0-2.el8_4
  • H