python3-lib389 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python3-lib389 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

<0:2.1.3-4.el9_1
  • M
Improper Authentication

<0:2.1.3-4.el9_1
  • M
Resource Exhaustion

<0:2.1.3-4.el9_1
  • M
NULL Pointer Dereference

<0:2.1.3-4.el9_1
  • M
Improper Authentication

<0:2.1.3-4.el9_1
  • M
Resource Exhaustion

<0:2.1.3-4.el9_1
  • M
NULL Pointer Dereference

<0:2.1.3-4.el9_1
  • M
Improper Authentication

<0:2.1.3-4.el9_1
  • M
Resource Exhaustion

<0:2.1.3-4.el9_1
  • H
Improper Input Validation

<0:2.4.5-8.el9_4
  • H
Improper Input Validation

<0:2.4.5-8.el9_4
  • M
NULL Pointer Dereference

<0:2.1.3-4.el9_1
  • M
Improper Authentication

<0:2.1.3-4.el9_1
  • M
Resource Exhaustion

<0:2.1.3-4.el9_1
  • M
Improper Handling of Missing Values

<0:2.4.5-9.el9_4
  • M
Improper Validation of Consistency within Input

<0:2.4.5-9.el9_4
  • H
Improper Validation of Consistency within Input

<0:2.2.4-9.el9_2
  • H
Improper Input Validation

<0:2.2.4-9.el9_2
  • H
Improper Input Validation

<0:2.2.4-9.el9_2
  • H
Heap-based Buffer Overflow

<0:2.2.4-9.el9_2
  • H
Improper Validation of Consistency within Input

<0:2.2.4-9.el9_2
  • H
Improper Input Validation

<0:2.2.4-9.el9_2
  • H
Improper Input Validation

<0:2.2.4-9.el9_2
  • H
Heap-based Buffer Overflow

<0:2.2.4-9.el9_2
  • H
Improper Validation of Consistency within Input

<0:2.2.4-9.el9_2
  • H
Improper Input Validation

<0:2.2.4-9.el9_2
  • H
Improper Input Validation

<0:2.2.4-9.el9_2
  • H
Heap-based Buffer Overflow

<0:2.2.4-9.el9_2
  • M
Improper Handling of Missing Values

<0:2.4.5-9.el9_4
  • M
Improper Validation of Consistency within Input

<0:2.4.5-9.el9_4
  • H
Improper Input Validation

<0:2.4.5-8.el9_4
  • H
Improper Input Validation

<0:2.4.5-8.el9_4
  • M
Heap-based Buffer Overflow

*
  • M
Inefficient Regular Expression Complexity

*
  • M
NULL Pointer Dereference

<0:2.0.14-3.el9_0
  • M
NULL Pointer Dereference

<0:2.1.3-4.el9_1
  • M
NULL Pointer Dereference

<0:2.1.3-4.el9_1
  • M
NULL Pointer Dereference

<0:2.0.14-3.el9_0
  • M
NULL Pointer Dereference

<0:2.1.3-4.el9_1
  • M
NULL Pointer Dereference

<0:2.1.3-4.el9_1
  • M
Improper Authentication

<0:2.0.14-3.el9_0
  • M
Improper Authentication

<0:2.1.3-4.el9_1
  • M
Improper Authentication

<0:2.1.3-4.el9_1
  • M
Improper Authentication

<0:2.1.3-4.el9_1
  • M
Improper Authentication

<0:2.1.3-4.el9_1
  • M
Improper Authentication

<0:2.0.14-3.el9_0
  • M
Resource Exhaustion

<0:2.1.3-4.el9_1
  • M
Resource Exhaustion

<0:2.0.14-3.el9_0
  • M
Resource Exhaustion

<0:2.0.14-3.el9_0
  • M
Resource Exhaustion

<0:2.1.3-4.el9_1
  • M
Resource Exhaustion

<0:2.1.3-4.el9_1
  • M
Resource Exhaustion

<0:2.1.3-4.el9_1