hdf5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the hdf5 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Divide By Zero

*
  • M
Divide By Zero

*
  • M
Divide By Zero

*
  • M
Divide By Zero

*
  • M
Divide By Zero

*
  • M
Divide By Zero

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Resource Exhaustion

*
  • L
Out-of-bounds Write

*