nss vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.mozilla.org|nss package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Remote Code Execution (RCE)

[3.14,3.68.1)[3.70,3.73)
  • M
Timing Attack

[0,)
  • M
Timing Attack

[,3.61)
  • H
Out-of-Bounds

[,3.12.3)
  • M
NULL Pointer Dereference

[,3.36.7)[3.41,3.41.1)
  • M
Out-of-Bounds

[,3.13.4)
  • H
Denial of Service (DoS)

[,3.21)
  • M
Session Fixation

[,3.30)
  • H
Out-of-Bounds

[,3.20.1)
  • M
Cryptographic Issues

[,3.21)
  • M
Improper Input Validation

[,3.12.3)
  • M
Improper Input Validation

[,3.16)
  • H
Race Condition

[,3.15.4)
  • C
Arbitrary Code Execution

[0,3.16.2)
  • H
Improper Certificate Validation

[,3.44)
  • H
Denial of Service (DoS)

[,3.58)
  • M
Cryptographic Issues

[,3.15.3.1)
  • H
Out-of-Bounds

[,3.20.1)
  • H
CVE-2014-1569

[,3.16.3)
  • M
Improper Input Validation

[,3.11.3)
  • M
Insecure Encryption

[,3.15.4)
  • H
Denial of Service (DoS)

[,3.21.1)
  • H
Denial of Service (DoS)

[0,3.15.3-2.el5)
  • H
Improper Input Validation

[0,3.15.3-2.el6_5)
  • M
CVE-2006-5462

[,3.11.3)
  • H
NULL Pointer Dereference

[3.24.0,3.30.1]
  • M
Access Restriction Bypass

[0,3.15.3)
  • M
Key Management Errors

[3.21,3.22)
  • C
Out-of-bounds Write

[,3.21.4)(3.22,3.28.4)[3.29,3.29.5)[3.30,3.30.1)
  • M
CVE-2018-12404

[,3.41)
  • H
Out-of-Bounds

[,3.21.1)
  • H
NULL Pointer Dereference

[,3.26)
  • M
Denial of Service (DoS)

[,3.15.2)
  • H
Cryptographic Issues

[,3.17.1)
  • H
Arbitrary Code Execution

[3.2,3.9]
  • M
Cryptographic Issues

[0,3.14.3)
  • H
Denial of Service (DoS)

[,3.23)
  • M
Improper Data Handling

[,43.0.2)
  • M
Denial of Service (DoS)

[,3.28.4)
  • M
Missing Initialization of Resource

[,3.39)
  • C
Out-of-bounds Read

[,3.55)
  • M
Out-of-Bounds

[0,)
  • C
Out-of-Bounds

[,3.20.1)
  • M
Out-of-Bounds

[,3.11.5)
  • C
Insufficient Verification of Data Authenticity

[,3.46)
  • M
Denial of Service (DoS)

[,3.11.5)
  • M
Cryptographic Issues

[,3.12.3)
  • L
Cryptographic Issues

[,3.19]
  • M
Cryptographic Issues

[,3.12.5)