freeradius-mysql vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the freeradius-mysql package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Authentication Bypass

<0:3.0.20-1.el7_9.1
  • M
Unsynchronized Access to Shared Data in a Multithreaded Context

<0:3.0.13-15.el7
  • M
Information Exposure

<0:3.0.13-15.el7
  • M
Incorrect Privilege Assignment

<0:3.0.13-15.el7
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Insufficiently Protected Credentials

*
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • M
Unsynchronized Access to Shared Data in a Multithreaded Context

<0:3.0.13-15.el7
  • M
Information Exposure

<0:3.0.13-15.el7
  • M
Incorrect Privilege Assignment

<0:3.0.13-15.el7
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Check for Certificate Revocation

*