openjpeg2-devel-docs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openjpeg2-devel-docs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Improper Initialization

<0:2.4.0-5.el8
  • L
Improper Initialization

<0:2.4.0-5.el8
  • L
Improper Initialization

<0:2.4.0-5.el8
  • L
Improper Initialization

<0:2.4.0-5.el8
  • L
Improper Initialization

<0:2.4.0-5.el8
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.0-10.el8_0
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-3.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.0-9.el8_0
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • H
Heap-based Buffer Overflow

<0:2.3.1-2.el8_1
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • L
Improper Input Validation

<0:2.3.1-1.el8
  • M
Out-of-bounds Write

<0:2.4.0-4.el8
  • M
Out-of-bounds Write

<0:2.4.0-4.el8
  • M
Out-of-bounds Write

<0:2.4.0-4.el8
  • M
Out-of-bounds Write

<0:2.4.0-4.el8
  • M
Out-of-bounds Write

<0:2.4.0-4.el8
  • M
Out-of-bounds Write

<0:2.4.0-4.el8
  • M
Out-of-bounds Write

<0:2.4.0-4.el8
  • M
Out-of-bounds Write

<0:2.4.0-4.el8
  • M
Out-of-bounds Write

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Heap-based Buffer Overflow

<0:2.4.0-4.el8
  • M
Heap-based Buffer Overflow

<0:2.4.0-4.el8
  • M
Heap-based Buffer Overflow

<0:2.4.0-4.el8
  • M
Heap-based Buffer Overflow

<0:2.4.0-4.el8
  • M
Heap-based Buffer Overflow

<0:2.4.0-4.el8
  • M
Heap-based Buffer Overflow

<0:2.4.0-4.el8
  • M
Heap-based Buffer Overflow

<0:2.4.0-4.el8
  • M
Heap-based Buffer Overflow

<0:2.4.0-4.el8
  • M
Heap-based Buffer Overflow

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Improper Input Validation

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Divide By Zero

<0:2.4.0-4.el8
  • M
Divide By Zero

<0:2.4.0-4.el8
  • M
Divide By Zero

<0:2.4.0-4.el8
  • M
Divide By Zero

<0:2.4.0-4.el8
  • M
Divide By Zero

<0:2.4.0-4.el8
  • M
Divide By Zero

<0:2.4.0-4.el8
  • M
Divide By Zero

<0:2.4.0-4.el8
  • M
Divide By Zero

<0:2.4.0-4.el8
  • M
Divide By Zero

<0:2.4.0-4.el8
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8
  • M
Integer Overflow or Wraparound

<0:2.4.0-4.el8