galera vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the galera package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2025-30722

<0:26.4.22-1.el9_6
  • M
CVE-2025-30693

<0:26.4.22-1.el9_6
  • M
Improper Resource Shutdown or Release

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
CVE-2025-30722

<0:26.4.22-1.el9_6
  • M
CVE-2025-30693

<0:26.4.22-1.el9_6
  • M
Improper Resource Shutdown or Release

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
CVE-2025-30722

<0:26.4.22-1.el9_6
  • M
CVE-2025-30693

<0:26.4.22-1.el9_6
  • M
Improper Resource Shutdown or Release

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
CVE-2025-30722

<0:26.4.22-1.el9_6
  • M
CVE-2025-30693

<0:26.4.22-1.el9_6
  • M
Improper Resource Shutdown or Release

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
CVE-2025-30722

<0:26.4.22-1.el9_6
  • M
CVE-2025-30693

<0:26.4.22-1.el9_6
  • M
Improper Resource Shutdown or Release

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
CVE-2025-30722

<0:26.4.22-1.el9_6
  • M
CVE-2025-30693

<0:26.4.22-1.el9_6
  • M
Improper Resource Shutdown or Release

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • M
Insecure Automated Optimizations

<0:26.4.22-1.el9_6
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_0
  • H
Improper Locking

<0:26.4.14-1.el9_0
  • H
Improper Handling of Values

<0:26.4.14-1.el9_0
  • H
Improper Handling of Values

<0:26.4.14-1.el9_0
  • H
Improper Handling of Values

<0:26.4.14-1.el9_0
  • H
Reachable Assertion

<0:26.4.14-1.el9_0
  • H
Improper Handling of Values

<0:26.4.14-1.el9_0
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_0
  • H
Improper Locking

<0:26.4.14-1.el9_0
  • H
Improper Handling of Values

<0:26.4.14-1.el9_0
  • H
Improper Handling of Values

<0:26.4.14-1.el9_0
  • H
Improper Handling of Values

<0:26.4.14-1.el9_0
  • H
Reachable Assertion

<0:26.4.14-1.el9_0
  • H
Improper Handling of Values

<0:26.4.14-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Handling of Values

<0:26.4.11-1.el9_0
  • M
Improper Locking

<0:26.4.11-1.el9_0
  • M
Improper Resource Shutdown or Release

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
CVE-2022-27445

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Out-of-Bounds

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
SQL Injection

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Reachable Assertion

<0:26.4.11-1.el9_0
  • M
Heap-based Buffer Overflow

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Use of Validation Framework

<0:26.4.11-1.el9_0
  • M
Buffer Overflow

<0:26.4.11-1.el9_0
  • M
CVE-2022-21595

<0:26.4.11-1.el9_0
  • M
Use After Free

<0:26.4.11-1.el9_0
  • M
Resource Exhaustion

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
NULL Pointer Dereference

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
Improper Input Validation

<0:26.4.11-1.el9_0
  • M
CVE-2024-21096

<0:26.4.20-1.el9_5
  • M
CVE-2023-22084

<0:26.4.20-1.el9_5
  • M
CVE-2024-21096

<0:26.4.20-1.el9_5
  • M
CVE-2023-22084

<0:26.4.20-1.el9_5
  • M
CVE-2024-21096

<0:26.4.20-1.el9_5
  • M
CVE-2023-22084

<0:26.4.20-1.el9_5
  • M
CVE-2024-21096

<0:26.4.20-1.el9_5
  • M
CVE-2023-22084

<0:26.4.20-1.el9_5
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • M
CVE-2024-21096

<0:26.4.20-1.el9_5
  • M
CVE-2023-22084

<0:26.4.20-1.el9_5
  • M
CVE-2024-21096

<0:26.4.20-1.el9_5
  • M
CVE-2023-22084

<0:26.4.20-1.el9_5
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_0
  • H
Resource Exhaustion

<0:26.4.14-1.el9_0
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
Resource Exhaustion

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
NULL Pointer Dereference

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Locking

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Improper Handling of Values

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2
  • H
Reachable Assertion

<0:26.4.14-1.el9_2