suricata vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://openinfosecfoundation.org|suricata package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improperly Implemented Security Check for Standard

[,7.0.12)[8.0.0,8.0.1)
  • H
NULL Pointer Dereference

[8.0.0,8.0.1)
  • M
Stack-based Buffer Overflow

[8.0.0,8.0.1)
  • H
NULL Pointer Dereference

[8.0.0,8.0.1)
  • M
Infinite loop

[,7.0.9)
  • H
Improper Verification of Cryptographic Signature

[,7.0.9)
  • M
Allocation of Resources Without Limits or Throttling

[,7.0.9)
  • M
Allocation of Resources Without Limits or Throttling

[,7.0.9)
  • H
Asymmetric Resource Consumption (Amplification)

[,7.0.8)
  • H
Incomplete Model of Endpoint Features

[,7.0.8)
  • M
Integer Overflow to Buffer Overflow

[,7.0.8)
  • M
Integer Underflow (Wrap or Wraparound)

[,7.0.8)
  • H
Stack-based Buffer Overflow

[,7.0.8)
  • H
Reachable Assertion

[,7.0.7)
  • H
Insecure Randomness

[,7.0.7)
  • H
Insecure Randomness

[,7.0.7)
  • M
Off-by-one Error

[,7.0.7)
  • H
Reachable Assertion

[,7.0.7)
  • H
Allocation of Resources Without Limits or Throttling

[,6.0.20)[7.0.0-beta1,7.0.6)
  • H
NULL Pointer Dereference

[,7.0.6)
  • M
Race Condition

[,6.0.20)[7.0.0-beta1,7.0.6)
  • H
Allocation of Resources Without Limits or Throttling

[,7.0.6)
  • H
Uncontrolled Resource Consumption ('Resource Exhaustion')

[6.0.0,6.0.19)[7.0.0,7.0.5)
  • M
Improper Check for Unusual or Exceptional Conditions

[6.0.0,6.0.19)[7.0.0,7.0.5)
  • M
Heap-based Buffer Overflow

[6.0.0,6.0.19)[7.0.0,7.0.5)
  • H
Allocation of Resources Without Limits or Throttling

[,6.0.17)[7.0.0,7.0.4)
  • H
Allocation of Resources Without Limits or Throttling

[,7.0.3)
  • H
Allocation of Resources Without Limits or Throttling

[,6.0.16)[7.0.0,7.0.3)
  • M
Improper Access Control

[,6.0.16)[7.0.0,7.0.3)
  • H
Use After Free

[7.0.0,7.0.3)
  • M
Directory Traversal

[,6.0.13)
  • H
Arbitrary Code Execution

[,6.0.13)
  • C
Out-of-bounds Read

[0,4.1.5)
  • C
Out-of-bounds Read

[0,4.1.5)
  • H
Improper Input Validation

[0,4.1.4)
  • H
Improper Neutralization

[0,4.1.4)
  • H
CVE-2019-18625

[0,4.1.6)[5.0.0,5.0.1)
  • H
Improper Check for Unusual or Exceptional Conditions

[0,5.0.0)
  • H
Out-of-bounds Read

[4.0.0,4.1.4)
  • H
Out-of-Bounds

[0,4.1.4)
  • C
Integer Overflow or Wraparound

[0,4.0.5)
  • H
CVE-2017-15377

[,3.2.5)
  • H
Improper Input Validation

[0,4.1.2)
  • H
Improper Verification of Cryptographic Signature

[,4.1.3)
  • H
Out-of-Bounds

[4.0.0,4.0.6)
  • H
Security Features

[,4.0.5)
  • M
Improper Input Validation

[,3.1.2)
  • H
CVE-2021-35063

[,5.0.7)[6.0.0,6.0.3)
  • M
Resource Management Errors

[,2.0.8)
  • C
Integer Underflow

[4.1.0,4.1.4)
  • M
Resource Management Errors

[,2.0.4)
  • C
Access Restriction Bypass

[,2.0.6)
  • C
Remote Code Execution (RCE)

[4.1.5,4.1.6)
  • C
Out-of-bounds Read

[0,4.1.5)
  • H
Out-of-bounds Read

[0,4.0.5)
  • M
Clickjacking

[,4.0.4)
  • M
Improper Input Validation

[,1.4.6)
  • H
Out-of-Bounds

[0,4.1.4)
  • H
Security Bypass

[,3.2.1)
  • M
Improper Input Validation

[4.1.4,4.1.5)