Direct Vulnerabilities

Known vulnerabilities in the pcs-snmp package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Verification of Cryptographic Signature

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Inefficient Regular Expression Complexity

*
  • H
Improper Certificate Validation

*
  • H
Unchecked Input for Loop Condition

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Unchecked Input for Loop Condition

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Executable Regular Expression Error

*
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Incorrect Behavior Order: Early Validation

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Use of Blocking Code in Single-threaded, Non-blocking Context

*
  • L
Server-Side Request Forgery (SSRF)

*
  • L
Server-Side Request Forgery (SSRF)

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.9-2.el9_6.3
  • H
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.10
  • H
Resource Exhaustion

<0:0.11.1-10.el9_0.10
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.1-10.el9_0.10
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.7-2.el9_4.6
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.4-7.el9_2.7
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.7-2.el9_4.6
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.7-2.el9_4.6
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.9-2.el9_6.3
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.9-2.el9_6.3
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.10-1.el9_7.2
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.10-1.el9_7.2
  • M
Deserialization of Untrusted Data

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.11.10-1.el9_7.2
  • M
Use of a Risky Cryptographic Primitive

*
  • M
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • H
Resource Exhaustion

<0:0.11.10-1.el9_7.1
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.6
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.6
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.6
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.4-7.el9_2.6
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Improper Validation of Specified Quantity in Input

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Improper Validation of Specified Quantity in Input

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.5
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.5
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.5
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.7-2.el9_4.5
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Improper Validation of Specified Quantity in Input

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Improper Validation of Specified Quantity in Input

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.5
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.5
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.5
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.7-2.el9_4.5
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Improper Validation of Specified Quantity in Input

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.2
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.9-2.el9_6.2
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.5
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.5
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.5
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.7-2.el9_4.5
  • H
Resource Exhaustion

<0:0.11.1-10.el9_0.9
  • H
Resource Exhaustion

<0:0.11.1-10.el9_0.9
  • H
Improper Validation of Specified Quantity in Input

<0:0.11.1-10.el9_0.9
  • H
Resource Exhaustion

<0:0.11.1-10.el9_0.9
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.1-10.el9_0.9
  • H
Resource Exhaustion

<0:0.11.10-1.el9_7.1
  • M
HTTP Request Smuggling

*
  • H
Improper Validation of Specified Quantity in Input

<0:0.11.10-1.el9_7.1
  • H
Resource Exhaustion

<0:0.11.10-1.el9_7.1
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.10-1.el9_7.1
  • H
Inefficient Regular Expression Complexity

<0:0.11.8-1.el9_5.2
  • H
Inefficient Regular Expression Complexity

<0:0.11.8-1.el9_5.2
  • H
Inefficient Regular Expression Complexity

<0:0.11.8-1.el9_5.2
  • H
Inefficient Regular Expression Complexity

<0:0.11.8-1.el9_5.2
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Improper Authentication

<0:0.11.3-4.el9
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.1
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.1
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.1
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.1
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • M
Improper Output Neutralization for Logs

<0:0.11.9-2.el9
  • M
Improper Output Neutralization for Logs

<0:0.11.9-2.el9
  • M
Improper Output Neutralization for Logs

<0:0.11.9-2.el9
  • M
Improper Output Neutralization for Logs

<0:0.11.9-2.el9
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Improper Authentication

<0:0.11.3-4.el9
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • M
Improper Authentication

<0:0.11.3-4.el9
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • M
Use of Insufficiently Random Values

*
  • L
Improper Handling of Unexpected Data Type

*
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • M
HTTP Request Smuggling

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Origin Validation Error

*
  • M
Exposed Dangerous Method or Function

*
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.4
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.5
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.5
  • H
Resource Exhaustion

<0:0.11.4-7.el9_2.5
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.4
  • H
Allocation of Resources Without Limits or Throttling

<0:0.11.1-10.el9_0.8
  • H
Resource Exhaustion

<0:0.11.1-10.el9_0.8
  • H
Resource Exhaustion

<0:0.11.7-2.el9_4.4
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.1
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

<0:0.11.9-2.el9
  • M
Race Condition

*
  • H
Resource Exhaustion

<0:0.11.9-2.el9_6.1
  • M
Race Condition

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Always-Incorrect Control Flow Implementation

*
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.4
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.4
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • H
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.7
  • H
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4.3
  • H
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4.3
  • H
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4.3
  • H
Inefficient Regular Expression Complexity

<0:0.11.8-1.el9_5.2
  • H
Inefficient Regular Expression Complexity

<0:0.11.8-1.el9_5.2
  • M
Improper Output Neutralization for Logs

<0:0.11.9-2.el9
  • H
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.6
  • M
Inefficient Regular Expression Complexity

*
  • M
CRLF Injection

*
  • M
Cross-site Scripting (XSS)

*
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Improper Authentication

<0:0.11.3-4.el9
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2.1
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.5
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Inefficient Regular Expression Complexity

<0:0.11.7-2.el9_4
  • M
Resource Exhaustion

*
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • H
CVE-2023-2319

<0:0.11.4-7.el9_2
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.4
  • M
Inefficient Regular Expression Complexity

<0:0.11.1-10.el9_0.4
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
Inefficient Regular Expression Complexity

<0:0.11.4-7.el9_2
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • H
CVE-2023-28154

<0:0.11.3-4.el9_1.3
  • M
Improper Input Validation

<0:0.11.1-10.el9_0.4
  • M
Improper Input Validation

<0:0.11.1-10.el9_0.4
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • H
Improper Input Validation

<0:0.11.4-7.el9_2
  • L
Improper Input Validation

<0:0.11.6-3.el9
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

*
  • M
Download of Code Without Integrity Check

<0:0.11.1-10.el9_0.3
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Download of Code Without Integrity Check

<0:0.11.1-10.el9_0.3
  • M
Download of Code Without Integrity Check

<0:0.11.3-4.el9_1.2
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Incorrect Default Permissions

<0:0.11.1-10.el9_0.2
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • H
Directory Traversal

<0:0.11.1-10.el9_0.1
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Improper Authentication

<0:0.11.3-4.el9
  • M
Resource Exhaustion

*