libdb-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libdb-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2023-44487

<0:5.3.28-42.el8_4
  • H
CVE-2023-40267

<0:5.3.28-42.el8_4
  • H
Allocation of Resources Without Limits or Throttling

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Information Exposure

<0:5.3.28-42.el8_4
  • H
Improper Input Validation

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Interpretation Conflict

<0:5.3.28-42.el8_4
  • H
CVE-2023-27539

<0:5.3.28-42.el8_4
  • H
Allocation of Resources Without Limits or Throttling

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
SQL Injection

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
OS Command Injection

<0:5.3.28-42.el8_4
  • H
CVE-2022-47318

<0:5.3.28-42.el8_4
  • H
Arbitrary Code Injection

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
CVE-2022-44566

<0:5.3.28-42.el8_4
  • H
Allocation of Resources Without Limits or Throttling

<0:5.3.28-42.el8_4
  • H
CVE-2022-4130

<0:5.3.28-42.el8_4
  • H
CVE-2022-40899

<0:5.3.28-42.el8_4
  • H
OS Command Injection

<0:5.3.28-42.el8_4
  • H
Insufficiently Protected Credentials

<0:5.3.28-42.el8_4
  • H
OS Command Injection

<0:5.3.28-42.el8_4
  • H
OS Command Injection

<0:5.3.28-42.el8_4
  • H
Improper Certificate Validation

<0:5.3.28-42.el8_4
  • H
Resource Exhaustion

<0:5.3.28-42.el8_4
  • H
Allocation of Resources Without Limits or Throttling

<0:5.3.28-42.el8_4
  • H
Arbitrary Code Injection

<0:5.3.28-42.el8_4
  • H
Deserialization of Untrusted Data

<0:5.3.28-42.el8_4
  • H
Deserialization of Untrusted Data

<0:5.3.28-42.el8_4
  • H
Exposure of Resource to Wrong Sphere

<0:5.3.28-42.el8_4
  • H
CVE-2022-41323

<0:5.3.28-42.el8_4
  • H
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • H
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • H
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • H
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • H
CVE-2022-33980

<0:5.3.28-42.el8_4
  • H
Deserialization of Untrusted Data

<0:5.3.28-42.el8_4
  • H
Directory Traversal

<0:5.3.28-42.el8_4
  • H
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Uncontrolled Recursion

<0:5.3.28-42.el8_4
  • H
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • H
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • L
CVE-2019-2708

<0:5.3.28-40.el8
  • M
SQL Injection

<0:5.3.28-42.el8_4
  • M
SQL Injection

<0:5.3.28-42.el8_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.3.28-42.el8_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.3.28-42.el8_4
  • M
Improper Resource Shutdown or Release

<0:5.3.28-42.el8_4
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:5.3.28-42.el8_4
  • M
Directory Traversal

<0:5.3.28-42.el8_4
  • M
Improper Input Validation

<0:5.3.28-42.el8_4
  • M
CVE-2021-45115

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
CVE-2021-44420

<0:5.3.28-42.el8_4
  • M
HTTP Request Smuggling

<0:5.3.28-42.el8_4
  • M
Deserialization of Untrusted Data

<0:5.3.28-42.el8_4
  • M
Authorization Bypass Through User-Controlled Key

<0:5.3.28-42.el8_4
  • M
HTTP Request Smuggling

<0:5.3.28-42.el8_4
  • M
OS Command Injection

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
Out-of-bounds Write

<0:5.3.28-42.el8_4
  • M
Resource Exhaustion

<0:5.3.28-42.el8_4
  • M
Buffer Overflow

<0:5.3.28-42.el8_4
  • M
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • M
HTTP Request Smuggling

<0:5.3.28-42.el8_4
  • M
HTTP Request Smuggling

<0:5.3.28-42.el8_4
  • M
Creation of Temporary File With Insecure Permissions

<0:5.3.28-42.el8_4
  • H
SQL Injection

<0:5.3.28-42.el8_4
  • H
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
Arbitrary Argument Injection

<0:5.3.28-42.el8_4
  • H
Inefficient Regular Expression Complexity

<0:5.3.28-42.el8_4
  • M
Cross-site Scripting (XSS)

<0:5.3.28-42.el8_4
  • H
Resource Exhaustion

<0:5.3.28-42.el8_4
  • H
Resource Exhaustion

<0:5.3.28-42.el8_4
  • H
Deserialization of Untrusted Data

<0:5.3.28-42.el8_4
  • H
Directory Traversal

<0:5.3.28-42.el8_4
  • M
Arbitrary Code Injection

<0:5.3.28-42.el8_4
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:5.3.28-42.el8_4