pcp-pmda-ds389 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the pcp-pmda-ds389 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Link Following

<0:5.3.7-19.el8_8
  • H
Out-of-bounds Write

<0:5.3.7-19.el8_8
  • H
Link Following

<0:5.3.7-19.el8_8
  • H
Out-of-bounds Write

<0:5.3.7-19.el8_8
  • H
Link Following

<0:5.3.7-19.el8_8
  • H
Out-of-bounds Write

<0:5.3.7-19.el8_8
  • H
Link Following

<0:5.3.5-10.el8_6
  • H
Out-of-bounds Write

<0:5.3.5-10.el8_6
  • H
Link Following

<0:5.3.5-10.el8_6
  • H
Out-of-bounds Write

<0:5.3.5-10.el8_6
  • H
Link Following

<0:5.3.7-19.el8_8
  • H
Out-of-bounds Write

<0:5.3.7-19.el8_8
  • H
Link Following

<0:5.3.5-10.el8_6
  • H
Out-of-bounds Write

<0:5.3.5-10.el8_6
  • H
Link Following

<0:5.2.5-8.el8_4
  • H
Out-of-bounds Write

<0:5.2.5-8.el8_4
  • H
Link Following

<0:5.2.5-8.el8_4
  • H
Out-of-bounds Write

<0:5.2.5-8.el8_4
  • H
Link Following

<0:5.2.5-8.el8_4
  • H
Out-of-bounds Write

<0:5.2.5-8.el8_4
  • H
Link Following

<0:5.0.2-9.el8_2
  • H
Out-of-bounds Write

<0:5.0.2-9.el8_2
  • H
Link Following

<0:5.3.7-22.el8_10
  • H
Out-of-bounds Write

<0:5.3.7-22.el8_10
  • H
Exposure of Resource to Wrong Sphere

<0:5.0.2-8.el8_2
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.5-9.el8_6
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.5-9.el8_6
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.5-9.el8_6
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.7-18.el8_8
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.5-9.el8_6
  • H
Exposure of Resource to Wrong Sphere

<0:5.2.5-7.el8_4
  • H
Exposure of Resource to Wrong Sphere

<0:5.2.5-7.el8_4
  • H
Exposure of Resource to Wrong Sphere

<0:5.2.5-7.el8_4
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.7-18.el8_8
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.7-18.el8_8
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.7-18.el8_8
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.7-20.el8_10
  • M
Symlink Following

*
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Arbitrary Code Injection

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8
  • L
Directory Traversal

<0:5.0.2-5.el8