pcs-snmp vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the pcs-snmp package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CRLF Injection

*
  • M
Reliance on Untrusted Inputs in a Security Decision

<0:0.10.18-2.el8_10.3
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:0.10.15-4.el8_8.3
  • M
Resource Exhaustion

<0:0.10.15-4.el8_8.3
  • M
Resource Exhaustion

<0:0.10.15-4.el8_8.3
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:0.10.15-4.el8_8.3
  • M
Resource Exhaustion

<0:0.10.15-4.el8_8.3
  • M
Resource Exhaustion

<0:0.10.15-4.el8_8.3
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:0.10.12-6.el8_6.6
  • M
Resource Exhaustion

<0:0.10.12-6.el8_6.6
  • M
Resource Exhaustion

<0:0.10.12-6.el8_6.6
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:0.10.15-4.el8_8.3
  • M
Resource Exhaustion

<0:0.10.15-4.el8_8.3
  • M
Resource Exhaustion

<0:0.10.15-4.el8_8.3
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:0.10.15-4.el8_8.3
  • M
Resource Exhaustion

<0:0.10.15-4.el8_8.3
  • M
Resource Exhaustion

<0:0.10.15-4.el8_8.3
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:0.10.12-6.el8_6.6
  • M
Resource Exhaustion

<0:0.10.12-6.el8_6.6
  • M
Resource Exhaustion

<0:0.10.12-6.el8_6.6
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:0.10.18-2.el8_10.2
  • M
Missing Required Cryptographic Step

*
  • M
Resource Exhaustion

<0:0.10.18-2.el8_10.2
  • M
Resource Exhaustion

<0:0.10.18-2.el8_10.2
  • L
Resource Exhaustion

<0:0.10.18-2.el8_10.1
  • H
Improper Validation of Syntactic Correctness of Input

*
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.5
  • M
Inefficient Regular Expression Complexity

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.2
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.4-6.el8_2.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.4-6.el8_2.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.4-6.el8_2.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.4-6.el8_2.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.4-6.el8_2.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.4-6.el8_2.5
  • M
Inefficient Regular Expression Complexity

<0:0.10.18-2.el8_10
  • M
Inefficient Regular Expression Complexity

<0:0.10.18-2.el8_10
  • M
Inefficient Regular Expression Complexity

<0:0.10.18-2.el8_10
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.1
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.4
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.1
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.1
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.4
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.4
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.4
  • M
Inefficient Regular Expression Complexity

<0:0.10.12-6.el8_6.4
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.4
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.1
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.4
  • M
Inefficient Regular Expression Complexity

<0:0.10.15-4.el8_8.1
  • M
Inefficient Regular Expression Complexity

<0:0.10.8-1.el8_4.4
  • M
Improper Input Validation

<0:0.10.15-4.el8_8.1
  • M
Improper Input Validation

<0:0.10.12-6.el8_6.4
  • M
Improper Input Validation

<0:0.10.8-1.el8_4.4
  • M
Improper Input Validation

<0:0.10.15-4.el8_8.1
  • M
Improper Input Validation

<0:0.10.8-1.el8_4.4
  • M
Improper Input Validation

<0:0.10.8-1.el8_4.4
  • M
Improper Input Validation

<0:0.10.8-1.el8_4.4
  • M
Improper Input Validation

<0:0.10.12-6.el8_6.4
  • M
Improper Input Validation

<0:0.10.12-6.el8_6.4
  • M
Improper Input Validation

<0:0.10.15-4.el8_8.1
  • M
Improper Input Validation

<0:0.10.15-4.el8_8.1
  • M
Improper Input Validation

<0:0.10.12-6.el8_6.4
  • M
Improper Input Validation

<0:0.10.15-4.el8_8.1
  • H
Improper Input Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

*
  • M
Download of Code Without Integrity Check

<0:0.10.8-1.el8_4.3
  • M
Download of Code Without Integrity Check

<0:0.10.2-4.el8_1.3
  • M
Download of Code Without Integrity Check

<0:0.10.4-6.el8_2.4
  • M
Download of Code Without Integrity Check

<0:0.10.8-1.el8_4.3
  • M
Download of Code Without Integrity Check

<0:0.10.8-1.el8_4.3
  • M
Download of Code Without Integrity Check

<0:0.10.14-5.el8_7.2
  • M
Download of Code Without Integrity Check

<0:0.10.12-6.el8_6.3
  • M
Download of Code Without Integrity Check

<0:0.10.14-5.el8_7.2
  • M
Download of Code Without Integrity Check

<0:0.10.12-6.el8_6.3
  • M
Download of Code Without Integrity Check

<0:0.10.8-1.el8_4.3
  • M
Download of Code Without Integrity Check

<0:0.10.14-5.el8_7.2
  • M
Download of Code Without Integrity Check

<0:0.10.12-6.el8_6.3
  • M
Download of Code Without Integrity Check

<0:0.10.14-5.el8_7.2
  • M
Download of Code Without Integrity Check

<0:0.10.4-6.el8_2.4
  • M
Download of Code Without Integrity Check

<0:0.10.14-5.el8_7.2
  • M
Download of Code Without Integrity Check

<0:0.10.12-6.el8_6.3
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • L
Incorrect Regular Expression

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Incorrect Default Permissions

<0:0.10.8-1.el8_4.2
  • H
Incorrect Default Permissions

<0:0.10.12-6.el8_6.2
  • H
Incorrect Default Permissions

<0:0.10.12-6.el8_6.2
  • H
Incorrect Default Permissions

<0:0.10.4-6.el8_2.3
  • H
Incorrect Default Permissions

<0:0.10.12-6.el8_6.2
  • H
Incorrect Default Permissions

<0:0.10.12-6.el8_6.2
  • H
Incorrect Default Permissions

<0:0.10.12-6.el8_6.2
  • H
Incorrect Default Permissions

<0:0.10.4-6.el8_2.3
  • H
Incorrect Default Permissions

<0:0.10.12-6.el8_6.2
  • H
Incorrect Default Permissions

<0:0.10.12-6.el8_6.2
  • H
Incorrect Default Permissions

<0:0.10.8-1.el8_4.2
  • H
Incorrect Default Permissions

<0:0.10.12-6.el8_6.2
  • H
Incorrect Default Permissions

<0:0.10.8-1.el8_4.2
  • H
Incorrect Default Permissions

<0:0.10.8-1.el8_4.2
  • H
Incorrect Default Permissions

<0:0.10.4-6.el8_2.3
  • H
Incorrect Default Permissions

<0:0.10.4-6.el8_2.3
  • H
Incorrect Default Permissions

<0:0.10.12-6.el8_6.2
  • H
Directory Traversal

<0:0.10.4-6.el8_2.2
  • H
Directory Traversal

<0:0.10.12-6.el8_6.1
  • H
Directory Traversal

<0:0.10.12-6.el8_6.1
  • H
Directory Traversal

<0:0.10.8-1.el8_4.1
  • H
Directory Traversal

<0:0.10.4-6.el8_2.2
  • H
Directory Traversal

<0:0.10.8-1.el8_4.1
  • H
Directory Traversal

<0:0.10.8-1.el8_4.1
  • H
Directory Traversal

<0:0.10.2-4.el8_1.2
  • H
Directory Traversal

<0:0.10.12-6.el8_6.1
  • H
Directory Traversal

<0:0.10.8-1.el8_4.1
  • H
Directory Traversal

<0:0.10.4-6.el8_2.2
  • H
Directory Traversal

<0:0.10.12-6.el8_6.1
  • H
Directory Traversal

<0:0.10.4-6.el8_2.2
  • H
Directory Traversal

<0:0.10.12-6.el8_6.1
  • H
Directory Traversal

<0:0.10.12-6.el8_6.1
  • H
Directory Traversal

<0:0.10.12-6.el8_6.1
  • H
Directory Traversal

<0:0.10.12-6.el8_6.1
  • H
Directory Traversal

<0:0.10.12-6.el8_6.1
  • M
Arbitrary Code Injection

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Improper Authentication

<0:0.10.14-5.el8
  • M
Improper Authentication

<0:0.10.14-5.el8
  • M
Improper Authentication

<0:0.10.14-5.el8
  • M
Improper Authentication

<0:0.10.14-5.el8
  • M
Improper Authentication

<0:0.10.14-5.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.1-4.el8_0.5
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.2-4.el8_1.1
  • M
Improper Input Validation

<0:0.10.2-4.el8_1.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • M
Improper Input Validation

<0:0.10.4-6.el8_2.1
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Arbitrary Code Injection

*
  • L
Arbitrary Code Injection

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8
  • L
Cross-site Scripting (XSS)

<0:0.10.10-4.el8