open-vm-tools vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the open-vm-tools package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Incorrect Privilege Assignment

<0:11.3.5-1.el8_6.5
  • H
Insufficient Granularity of Access Control

<0:11.3.5-1.el8_6.5
  • H
Incorrect Privilege Assignment

<0:11.0.0-4.el8_2.4
  • H
Insufficient Granularity of Access Control

<0:11.0.0-4.el8_2.4
  • H
Incorrect Privilege Assignment

<0:11.2.0-2.el8_4.4
  • H
Insufficient Granularity of Access Control

<0:11.2.0-2.el8_4.4
  • H
Incorrect Privilege Assignment

<0:11.0.0-4.el8_2.4
  • H
Insufficient Granularity of Access Control

<0:11.0.0-4.el8_2.4
  • H
Incorrect Privilege Assignment

<0:11.3.5-1.el8_6.5
  • H
Insufficient Granularity of Access Control

<0:11.3.5-1.el8_6.5
  • H
Incorrect Privilege Assignment

<0:11.2.0-2.el8_4.4
  • H
Insufficient Granularity of Access Control

<0:11.2.0-2.el8_4.4
  • H
Incorrect Privilege Assignment

<0:11.2.0-2.el8_4.4
  • H
Insufficient Granularity of Access Control

<0:11.2.0-2.el8_4.4
  • H
Incorrect Privilege Assignment

<0:11.3.5-1.el8_6.5
  • H
Insufficient Granularity of Access Control

<0:11.3.5-1.el8_6.5
  • H
Incorrect Privilege Assignment

<0:11.3.5-1.el8_6.5
  • H
Insufficient Granularity of Access Control

<0:11.3.5-1.el8_6.5
  • H
Incorrect Privilege Assignment

<0:10.3.10-3.el8_1.5
  • H
Insufficient Granularity of Access Control

<0:10.3.10-3.el8_1.5
  • H
Incorrect Privilege Assignment

<0:11.0.0-4.el8_2.4
  • H
Insufficient Granularity of Access Control

<0:11.0.0-4.el8_2.4
  • H
Incorrect Privilege Assignment

<0:12.1.5-2.el8_8.4
  • H
Insufficient Granularity of Access Control

<0:12.1.5-2.el8_8.4
  • H
Incorrect Privilege Assignment

<0:12.1.5-2.el8_8.4
  • H
Insufficient Granularity of Access Control

<0:12.1.5-2.el8_8.4
  • H
Incorrect Privilege Assignment

<0:12.1.5-2.el8_8.4
  • H
Insufficient Granularity of Access Control

<0:12.1.5-2.el8_8.4
  • H
Incorrect Privilege Assignment

<0:12.1.5-2.el8_8.4
  • H
Insufficient Granularity of Access Control

<0:12.1.5-2.el8_8.4
  • H
Insufficient Granularity of Access Control

<0:12.2.5-3.el8_9.1
  • H
Incorrect Privilege Assignment

<0:12.2.5-3.el8_9.1
  • H
Improper Verification of Cryptographic Signature

<0:11.2.0-2.el8_4.3
  • H
Improper Verification of Cryptographic Signature

<0:11.3.5-1.el8_6.4
  • H
Improper Verification of Cryptographic Signature

<0:11.3.5-1.el8_6.4
  • H
Improper Verification of Cryptographic Signature

<0:12.1.5-2.el8_8.3
  • H
Improper Verification of Cryptographic Signature

<0:10.3.10-3.el8_1.4
  • H
Improper Verification of Cryptographic Signature

<0:12.1.5-2.el8_8.3
  • H
Improper Verification of Cryptographic Signature

<0:12.1.5-2.el8_8.3
  • H
Improper Verification of Cryptographic Signature

<0:11.3.5-1.el8_6.4
  • H
Improper Verification of Cryptographic Signature

<0:11.2.0-2.el8_4.3
  • H
Improper Verification of Cryptographic Signature

<0:11.2.0-2.el8_4.3
  • H
Improper Verification of Cryptographic Signature

<0:12.1.5-2.el8_8.3
  • H
Improper Verification of Cryptographic Signature

<0:11.3.5-1.el8_6.4
  • H
Improper Verification of Cryptographic Signature

<0:11.0.0-4.el8_2.3
  • H
Improper Verification of Cryptographic Signature

<0:11.0.0-4.el8_2.3
  • H
Improper Verification of Cryptographic Signature

<0:12.1.5-2.el8_8.3
  • H
Improper Verification of Cryptographic Signature

<0:11.0.0-4.el8_2.3
  • L
Improper Authentication

<0:11.2.0-2.el8_4.2
  • L
Improper Authentication

<0:12.1.5-2.el8_8
  • L
Improper Authentication

<0:11.3.5-1.el8_6.2
  • L
Improper Authentication

<0:11.0.0-4.el8_2.2
  • L
Improper Authentication

<0:11.3.5-1.el8_6.2
  • L
Improper Authentication

<0:12.1.5-2.el8_8
  • L
Improper Authentication

<0:11.2.0-2.el8_4.2
  • L
Improper Authentication

<0:12.1.5-2.el8_8
  • L
Improper Authentication

<0:11.2.0-2.el8_4.2
  • L
Improper Authentication

<0:11.3.5-1.el8_6.2
  • L
Improper Authentication

<0:11.0.0-4.el8_2.2
  • L
Improper Authentication

<0:11.0.0-4.el8_2.2
  • L
Improper Authentication

<0:11.3.5-1.el8_6.2
  • L
Improper Authentication

<0:12.1.5-2.el8_8
  • L
Improper Authentication

<0:12.1.5-2.el8_8
  • L
Link Following

*
  • H
Execution with Unnecessary Privileges

<0:11.3.5-1.el8_6.1
  • H
Execution with Unnecessary Privileges

<0:11.0.0-4.el8_2.1
  • H
Execution with Unnecessary Privileges

<0:11.3.5-1.el8_6.1
  • H
Execution with Unnecessary Privileges

<0:11.0.0-4.el8_2.1
  • H
Execution with Unnecessary Privileges

<0:11.3.5-1.el8_6.1
  • H
Execution with Unnecessary Privileges

<0:11.3.5-1.el8_6.1
  • H
Execution with Unnecessary Privileges

<0:11.3.5-1.el8_6.1
  • H
Execution with Unnecessary Privileges

<0:11.2.0-2.el8_4.1
  • H
Execution with Unnecessary Privileges

<0:11.3.5-1.el8_6.1
  • H
Execution with Unnecessary Privileges

<0:11.0.0-4.el8_2.1
  • H
Execution with Unnecessary Privileges

<0:11.0.0-4.el8_2.1
  • H
Execution with Unnecessary Privileges

<0:11.3.5-1.el8_6.1
  • H
Execution with Unnecessary Privileges

<0:11.3.5-1.el8_6.1
  • H
Execution with Unnecessary Privileges

<0:10.3.10-3.el8_1.3
  • H
Execution with Unnecessary Privileges

<0:11.2.0-2.el8_4.1
  • H
Execution with Unnecessary Privileges

<0:11.2.0-2.el8_4.1
  • H
Execution with Unnecessary Privileges

<0:11.3.5-1.el8_6.1
  • H
Execution with Unnecessary Privileges

<0:11.2.0-2.el8_4.1