Known Vulnerabilities for Net-snmp by Net-snmp

Listed below are 10 of the newest known vulnerabilities associated with "Net-snmp" by "Net-snmp".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2020-15862 Net-SNMP through 5.7.3 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to ... 7.8 - HIGH 2020-08-20 2023-11-22
CVE-2020-15861 Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following. 7.8 - HIGH 2020-08-20 2022-12-03
CVE-2019-20892 net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request... 6.5 - MEDIUM 2020-06-25 2022-09-02
CVE-2018-1000116 NET-SNMP version 5.7.2 contains a heap corruption vulnerability in the UDP protocol handler that can result in command execut... 9.8 - CRITICAL 2018-03-07 2020-08-24
CVE-2018-18066 snmp_oid_compare in snmplib/snmp_api.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an unauthe... 7.5 - HIGH 2018-10-08 2019-10-16
CVE-2018-18065 _set_key in agent/helpers/table_container.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an au... 6.5 - MEDIUM 2018-10-08 2019-10-16
CVE-2015-8100 The net-snmp package in OpenBSD through 5.8 uses 0644 permissions for snmpd.conf, which allows local users to obtain sensitiv... 2.1 - LOW 2015-11-10 2016-12-07
CVE-2015-5621 The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_var... 7.5 - HIGH 2015-08-19 2018-10-10
CVE-2014-2285 The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain P... 4.3 - MEDIUM 2014-04-27 2016-12-08
CVE-2014-2284 The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does ... 5 - MEDIUM 2014-03-24 2014-09-13

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationNet-snmpNet-snmp5.8AllAllAll
ApplicationNet-snmpNet-snmp5.7.3AllAllAll
ApplicationNet-snmpNet-snmp5.7.2AllAllAll
ApplicationNet-snmpNet-snmp5.7.1AllAllAll
ApplicationNet-snmpNet-snmp5.7AllAllAll
ApplicationNet-snmpNet-snmp5.6AllAllAll
ApplicationNet-snmpNet-snmp5.5AllAllAll
ApplicationNet-snmpNet-snmp5.4AllAllAll
ApplicationNet-snmpNet-snmp5.3.0.1AllAllAll
ApplicationNet-snmpNet-snmp5.3AllAllAll
ApplicationNet-snmpNet-snmp5.2AllAllAll
ApplicationNet-snmpNet-snmp5.1.2AllAllAll
ApplicationNet-snmpNet-snmp5.1AllAllAll
ApplicationNet-snmpNet-snmp5.0.9AllAllAll
ApplicationNet-snmpNet-snmp5.0.8AllAllAll
ApplicationNet-snmpNet-snmp5.0.7AllAllAll
ApplicationNet-snmpNet-snmp5.0.6AllAllAll
ApplicationNet-snmpNet-snmp5.0.5AllAllAll
ApplicationNet-snmpNet-snmp5.0.4AllAllAll
ApplicationNet-snmpNet-snmp5.0.3AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report