libdb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libdb package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2019-2708

<0:5.3.28-40.el8
  • M
SQL Injection

<0:5.3.28-42.el8_4
  • M
SQL Injection

<0:5.3.28-42.el8_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.3.28-42.el8_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.3.28-42.el8_4
  • M
Improper Resource Shutdown or Release

<0:5.3.28-42.el8_4
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:5.3.28-42.el8_4
  • M
Directory Traversal

<0:5.3.28-42.el8_4
  • M
Improper Input Validation

<0:5.3.28-42.el8_4
  • M
CVE-2021-45115

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
CVE-2021-44420

<0:5.3.28-42.el8_4
  • M
HTTP Request Smuggling

<0:5.3.28-42.el8_4
  • M
Deserialization of Untrusted Data

<0:5.3.28-42.el8_4
  • M
Authorization Bypass Through User-Controlled Key

<0:5.3.28-42.el8_4
  • M
HTTP Request Smuggling

<0:5.3.28-42.el8_4
  • M
OS Command Injection

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
Resource Exhaustion

<0:5.3.28-42.el8_4
  • M
Buffer Overflow

<0:5.3.28-42.el8_4
  • M
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • M
HTTP Request Smuggling

<0:5.3.28-42.el8_4
  • M
HTTP Request Smuggling

<0:5.3.28-42.el8_4
  • M
Creation of Temporary File With Insecure Permissions

<0:5.3.28-42.el8_4
  • H
SQL Injection

<0:5.3.28-42.el8_4
  • H
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
Arbitrary Argument Injection

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • M
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
Resource Exhaustion

<0:5.3.28-42.el8_4
  • H
Resource Exhaustion

<0:5.3.28-42.el8_4
  • H
Directory Traversal

<0:5.3.28-42.el8_4
  • M
Arbitrary Code Injection

<0:5.3.28-42.el8_4