Количество 10
Количество 10

BDU:2022-04637
Уязвимость набора программного обеспечения Net-SNMP, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20240815-10
Множественные уязвимости net-snmp

CVE-2022-24806
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

CVE-2022-24806
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

CVE-2022-24806
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.
CVE-2022-24806
net-snmp provides various tools relating to the Simple Network Managem ...

SUSE-SU-2022:4205-1
Security update for net-snmp

SUSE-RU-2024:0029-1
Recommended update for net-snmp

RLSA-2024:7260
Moderate: net-snmp security update
ELSA-2024-7260
ELSA-2024-7260: net-snmp security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-04637 Уязвимость набора программного обеспечения Net-SNMP, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | почти 3 года назад |
![]() | ROS-20240815-10 Множественные уязвимости net-snmp | CVSS3: 9.1 | 10 месяцев назад | |
![]() | CVE-2022-24806 net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2022-24806 net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range. | CVSS3: 5.9 | 0% Низкий | почти 3 года назад |
![]() | CVE-2022-24806 net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
CVE-2022-24806 net-snmp provides various tools relating to the Simple Network Managem ... | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2022:4205-1 Security update for net-snmp | больше 2 лет назад | ||
![]() | SUSE-RU-2024:0029-1 Recommended update for net-snmp | больше 1 года назад | ||
![]() | RLSA-2024:7260 Moderate: net-snmp security update | 9 месяцев назад | ||
ELSA-2024-7260 ELSA-2024-7260: net-snmp security update (MODERATE) | 9 месяцев назад |
Уязвимостей на страницу