rsync-daemon vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rsync-daemon package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Directory Traversal

<0:3.1.3-14.el8_6.9
  • M
Directory Traversal

<0:3.1.3-14.el8_6.9
  • M
Directory Traversal

<0:3.1.3-14.el8_6.9
  • M
Directory Traversal

<0:3.1.3-20.el8_8.4
  • M
Directory Traversal

<0:3.1.3-20.el8_8.4
  • M
Directory Traversal

<0:3.1.3-12.el8_4.6
  • M
Directory Traversal

<0:3.1.3-7.el8_2.6
  • M
Improper Validation of Array Index

*
  • L
Out-of-bounds Read

<0:3.1.3-20.el8_8.3
  • L
Out-of-bounds Read

<0:3.1.3-20.el8_8.3
  • L
Out-of-bounds Read

<0:3.1.3-14.el8_6.8
  • L
Out-of-bounds Read

<0:3.1.3-14.el8_6.8
  • L
Out-of-bounds Read

<0:3.1.3-14.el8_6.8
  • L
Out-of-bounds Read

<0:3.1.3-7.el8_2.5
  • L
Out-of-bounds Read

<0:3.1.3-12.el8_4.5
  • L
Out-of-bounds Read

<0:3.1.3-23.el8_10
  • H
Use of Uninitialized Resource

<0:3.1.3-12.el8_4.3
  • H
Use of Uninitialized Resource

<0:3.1.3-12.el8_4.3
  • H
Use of Uninitialized Resource

<0:3.1.3-12.el8_4.3
  • H
Use of Uninitialized Resource

<0:3.1.3-7.el8_2.3
  • H
Use of Uninitialized Resource

<0:3.1.3-20.el8_8.1
  • H
Use of Uninitialized Resource

<0:3.1.3-20.el8_8.1
  • H
Use of Uninitialized Resource

<0:3.1.3-20.el8_8.1
  • H
Use of Uninitialized Resource

<0:3.1.3-20.el8_8.1
  • H
Use of Uninitialized Resource

<0:3.1.3-14.el8_6.6
  • H
Use of Uninitialized Resource

<0:3.1.3-14.el8_6.6
  • H
Use of Uninitialized Resource

<0:3.1.3-14.el8_6.6
  • H
Use of Uninitialized Resource

<0:3.1.3-20.el8_10
  • M
Detection of Error Condition Without Action

*
  • M
Directory Traversal

<0:3.1.3-21.el8_10
  • M
Race Condition

<0:3.1.3-21.el8_10
  • M
Directory Traversal

<0:3.1.3-21.el8_10
  • M
Out-of-Bounds

<0:3.1.3-14.el8_6.5
  • M
Out-of-Bounds

<0:3.1.3-14.el8_6.5
  • M
Out-of-Bounds

<0:3.1.3-14.el8_6.5
  • M
Out-of-Bounds

<0:3.1.3-14.el8_6.5
  • M
Out-of-Bounds

<0:3.1.3-19.el8
  • M
Out-of-Bounds

<0:3.1.3-19.el8
  • M
Out-of-Bounds

<0:3.1.3-19.el8
  • M
Out-of-Bounds

<0:3.1.3-19.el8
  • M
Out-of-Bounds

<0:3.1.3-19.el8
  • H
Directory Traversal

<0:3.1.3-14.el8_6.3
  • H
Directory Traversal

<0:3.1.3-7.el8_2.2
  • H
Directory Traversal

<0:3.1.3-12.el8_4.2
  • H
Directory Traversal

<0:3.1.3-14.el8_6.3
  • H
Directory Traversal

<0:3.1.3-7.el8_2.2
  • H
Directory Traversal

<0:3.1.3-7.el8_2.2
  • H
Directory Traversal

<0:3.1.3-14.el8_6.3
  • H
Directory Traversal

<0:3.1.3-12.el8_4.2
  • H
Directory Traversal

<0:3.1.3-14.el8_6.3
  • H
Directory Traversal

<0:3.1.3-7.el8_2.2
  • H
Directory Traversal

<0:3.1.3-12.el8_4.2
  • H
Directory Traversal

<0:3.1.3-14.el8_6.3
  • H
Directory Traversal

<0:3.1.3-6.el8_1.2
  • H
Directory Traversal

<0:3.1.3-14.el8_6.3
  • H
Directory Traversal

<0:3.1.3-14.el8_6.3
  • H
Directory Traversal

<0:3.1.3-14.el8_6.3
  • H
Directory Traversal

<0:3.1.3-12.el8_4.2
  • H
Directory Traversal

<0:3.1.3-14.el8_6.3
  • H
Out-of-Bounds

<0:3.1.3-14.el8_6.2
  • H
Out-of-Bounds

<0:3.1.3-7.el8_2.1
  • H
Out-of-Bounds

<0:3.1.3-7.el8_2.1
  • H
Out-of-Bounds

<0:3.1.3-7.el8_2.1
  • H
Out-of-Bounds

<0:3.1.3-12.el8_4.1
  • H
Out-of-Bounds

<0:3.1.3-14.el8_6.2
  • H
Out-of-Bounds

<0:3.1.3-6.el8_1.1
  • H
Out-of-Bounds

<0:3.1.3-12.el8_4.1
  • H
Out-of-Bounds

<0:3.1.3-14.el8_6.2
  • H
Out-of-Bounds

<0:3.1.3-14.el8_6.2
  • H
Out-of-Bounds

<0:3.1.3-7.el8_2.1
  • H
Out-of-Bounds

<0:3.1.3-14.el8_6.2
  • H
Out-of-Bounds

<0:3.1.3-14.el8_6.2
  • H
Out-of-Bounds

<0:3.1.3-14.el8_6.2
  • H
Out-of-Bounds

<0:3.1.3-12.el8_4.1
  • H
Out-of-Bounds

<0:3.1.3-14.el8_6.2
  • H
Out-of-Bounds

<0:3.1.3-12.el8_4.1
  • H
Out-of-Bounds

<0:3.1.3-14.el8_6.2