nss_db vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nss_db package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-101.el8_2.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-101.el8_2.2
  • H
NULL Pointer Dereference

<0:2.28-101.el8_2.2
  • H
Out-of-Bounds

<0:2.28-101.el8_2.2
  • H
Out-of-bounds Write

<0:2.28-101.el8_2.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
NULL Pointer Dereference

<0:2.28-151.el8_4.2
  • H
Out-of-Bounds

<0:2.28-151.el8_4.2
  • H
Out-of-bounds Write

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
NULL Pointer Dereference

<0:2.28-151.el8_4.2
  • H
Out-of-Bounds

<0:2.28-151.el8_4.2
  • H
Out-of-bounds Write

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
NULL Pointer Dereference

<0:2.28-225.el8_8.11
  • H
Out-of-Bounds

<0:2.28-225.el8_8.11
  • H
Out-of-bounds Write

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
NULL Pointer Dereference

<0:2.28-225.el8_8.11
  • H
Out-of-Bounds

<0:2.28-225.el8_8.11
  • H
Out-of-bounds Write

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
NULL Pointer Dereference

<0:2.28-225.el8_8.11
  • H
Out-of-Bounds

<0:2.28-225.el8_8.11
  • H
Out-of-bounds Write

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
NULL Pointer Dereference

<0:2.28-225.el8_8.11
  • H
Out-of-Bounds

<0:2.28-225.el8_8.11
  • H
Out-of-bounds Write

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
NULL Pointer Dereference

<0:2.28-151.el8_4.2
  • H
Out-of-Bounds

<0:2.28-151.el8_4.2
  • H
Out-of-bounds Write

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
NULL Pointer Dereference

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-189.10.el8_6
  • H
Out-of-bounds Write

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
NULL Pointer Dereference

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-189.10.el8_6
  • H
Out-of-bounds Write

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
NULL Pointer Dereference

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-189.10.el8_6
  • H
Out-of-bounds Write

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
NULL Pointer Dereference

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-189.10.el8_6
  • H
Out-of-bounds Write

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-251.el8_10.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-251.el8_10.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-251.el8_10.2
  • H
NULL Pointer Dereference

<0:2.28-251.el8_10.2
  • H
Out-of-bounds Write

<0:2.28-251.el8_10.1
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-189.6.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-189.6.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Heap-based Buffer Overflow

<0:2.28-189.6.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Heap-based Buffer Overflow

<0:2.28-189.6.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Improper Input Validation

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Improper Input Validation

<0:2.28-151.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8