nss vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nss package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Improper Certificate Validation

<2:3.26.2-1.1+deb9u5
  • C
Out-of-bounds Write

<2:3.26.2-1.1+deb9u3
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Information Exposure

<2:3.17-1
  • C
Out-of-bounds Read

<2:3.26.2-1.1+deb9u2
  • M
Information Exposure

<2:3.26.2-1.1+deb9u2
  • M
CVE-2020-6829

<2:3.26.2-1.1+deb9u2
  • M
Use of a Broken or Risky Cryptographic Algorithm

<2:3.26.2-1.1+deb9u2
  • M
Use of a Broken or Risky Cryptographic Algorithm

<2:3.26.2-1.1+deb9u2
  • M
Information Exposure

<2:3.26.2-1.1+deb9u2
  • C
Insufficient Verification of Data Authenticity

<2:3.26.2-1.1+deb9u2
  • H
Improper Certificate Validation

<2:3.26.2-1.1+deb9u2
  • H
Out-of-bounds Write

<2:3.26.2-1.1+deb9u2
  • H
Out-of-Bounds

<2:3.26.2-1.1+deb9u2
  • M
Improper Certificate Validation

*
  • H
Out-of-bounds Read

<2:3.26.2-1.1+deb9u2
  • M
NULL Pointer Dereference

<2:3.26.2-1.1+deb9u2
  • M
CVE-2018-12404

<2:3.26.2-1.1+deb9u2
  • L
PRNG Seed Error

*
  • M
Session Fixation

<2:3.25-1
  • H
NULL Pointer Dereference

<2:3.25-1
  • M
Key Management Errors

<2:3.25-1
  • M
Incorrect Calculation

<2:3.26.2-1.1
  • H
Use After Free

<2:3.26.2-1.1+deb9u1
  • M
Information Exposure

<2:3.26.2-1
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • H
NULL Pointer Dereference

<2:3.26.2-1.1
  • C
Out-of-bounds Write

<2:3.26.2-1.1
  • H
CVE-2016-2834

<2:3.23-1
  • H
CVE-2016-1978

<2:3.21-1
  • H
Out-of-Bounds

<2:3.23-1
  • H
CVE-2016-1979

<2:3.21-1
  • M
Cryptographic Issues

<3.13
  • M
Cryptographic Issues

<2:3.21-1
  • M
Improper Data Handling

<2:3.21-1
  • C
Out-of-Bounds

<2:3.20.1-1
  • H
Out-of-Bounds

<2:3.20.1-1
  • M
Cryptographic Issues

<2:3.19.1-1
  • M
Cryptographic Issues

<2:3.19.1-1
  • L
Cryptographic Issues

<2:3.19.1-1
  • H
CVE-2014-1569

<2:3.17.2-1.1
  • L
Cryptographic Issues

<2:3.17.1-1
  • H
Cryptographic Issues

<2:3.17.1-1
  • C
CVE-2014-1544

<2:3.16.3-1
  • M
Improper Input Validation

<2:3.16-1
  • H
Race Condition

<2:3.15.4-1
  • M
Inadequate Encryption Strength

<2:3.15.4-1
  • M
Cryptographic Issues

<2:3.15.4-1
  • M
Access Restriction Bypass

<2:3.15.3-1
  • H
Numeric Errors

<2:3.15.3-1
  • H
Improper Input Validation

<2:3.15.3-1
  • M
CVE-2013-1739

<2:3.15.2-1
  • L
Out-of-Bounds

<2:3.14.3-1
  • L
Cryptographic Issues

<2:3.14.3-1
  • L
Cryptographic Issues

<2:3.14.3-1
  • M
Out-of-Bounds

<3.13.4-1
  • L
Untrusted Search Path

<3.13.1.with.ckbi.1.88-1
  • M
Improper Input Validation

<3.13.1.with.ckbi.1.88-1
  • H
Cryptographic Issues

<3.12.8-1
  • M
Cryptographic Issues

<3.12.8-1
  • M
Cryptographic Issues

<3.12.6-1
  • L
Out-of-Bounds

<3.12.3-1
  • M
Improper Input Validation

<3.12.3-1
  • L
Cryptographic Issues

<3.12.3-1