samba-swat vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the samba-swat package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Use of Uninitialized Resource

*
  • M
Resource Exhaustion

*
  • M
Incorrect Default Permissions

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • H
Reversible One-Way Hash

*
  • L
Unchecked Return Value

*
  • M
Information Exposure

*
  • L
Race Condition

*
  • M
Race Condition

*
  • H
Improper Input Validation

*
  • M
Improper Authentication

*
  • L
NULL Pointer Dereference

<0:3.6.23-51.el6
  • M
Credentials Management

<0:3.6.9-168.el6_5
  • M
Improper Input Validation

<0:3.6.9-168.el6_5
  • M
Out-of-Bounds

*
  • H
Access Restriction Bypass

<0:3.6.9-167.el6_5
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.6.9-167.el6_5
  • M
Man-in-the-Middle (MitM)

<0:3.6.23-45.el6_9
  • M
Information Exposure

<0:3.6.23-45.el6_9
  • M
Cross-site Request Forgery (CSRF)

<0:3.6.9-164.el6
  • M
Integer Overflow or Wraparound

<0:3.6.9-164.el6
  • M
Improper Input Validation

<0:3.6.9-164.el6
  • H
Arbitrary Code Injection

<0:3.6.23-43.el6_9
  • M
Race Condition

<0:3.6.23-45.el6_9
  • M
Improper Authentication

<0:3.6.23-41.el6
  • M
Access Restriction Bypass

<0:3.6.23-41.el6
  • C
Man-in-the-Middle (MitM)

<0:3.6.23-30.el6_7
  • C
Man-in-the-Middle (MitM)

<0:3.6.23-30.el6_7
  • C
Authentication Bypass

<0:3.6.23-30.el6_7
  • C
Man-in-the-Middle (MitM)

<0:3.6.23-30.el6_7
  • C
CVE-2015-5370

<0:3.6.23-30.el6_7
  • C
Man-in-the-Middle (MitM)

<0:3.6.23-30.el6_7
  • M
Improper Access Control

<0:3.6.23-25.el6_7
  • M
Missing Authorization

<0:3.6.23-24.el6_7
  • M
Insufficient Verification of Data Authenticity

<0:3.6.23-24.el6_7
  • M
Path Equivalence

<0:3.6.23-24.el6_7
  • H
Access Restriction Bypass

<0:3.5.10-116.el6_2
  • C
Improper Handling of Syntactically Invalid Structure

<0:3.5.4-68.el6_0.3
  • M
Cross-site Scripting (XSS)

<0:3.5.6-86.el6_1.4
  • M
Cross-site Request Forgery (CSRF)

<0:3.5.6-86.el6_1.4
  • M
Race Condition

<0:3.5.6-86.el6_1.4
  • M
Improper Input Validation

<0:3.5.6-86.el6_1.4
  • M
Improper Input Validation

<0:3.5.6-86.el6_1.4
  • H
Out-of-Bounds

<0:3.5.4-68.el6_0.2
  • C
Out-of-Bounds

<0:3.6.23-14.el6_6
  • C
Improper Validation of Array Index

<0:3.5.4-68.el6_0.1
  • M
Improper Input Validation

<0:3.6.9-169.el6_5
  • M
Encoding Error

<0:3.6.9-169.el6_5
  • C
Improper Authentication

*
  • M
Improper Null Termination

*
  • M
Incorrect Privilege Assignment

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Out-of-bounds Read

*