net-snmp-utils vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the net-snmp-utils package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
NULL Pointer Dereference

<1:5.8-27.el8
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Improper Protection for Out of Bounds Signal Level Alerts

*
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-12.el8_1.3
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-7.el8_0.4
  • H
Execution with Unnecessary Privileges

<1:5.8-12.el8_1.3
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-14.el8_2.3
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-14.el8_2.3
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • H
Execution with Unnecessary Privileges

<1:5.8-14.el8_2.3
  • H
Execution with Unnecessary Privileges

<1:5.8-14.el8_2.3
  • H
Execution with Unnecessary Privileges

<1:5.8-18.el8_3.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1
  • M
Use After Free

<1:5.8-12.el8_1.1