Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
nss ldap nss ldap vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2007-5794
Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot...
Nss Ldap Nss Ldap
7.5
CVSSv2
CVE-2002-0735
Format string vulnerability in the logging() function in C-Note Squid LDAP authentication module (squid_auth_LDAP) 2.0.2 and previous versions allows remote malicious users to cause a denial of service and possibly execute arbitrary code by triggering log messages.
Padl Software Nss Ldap Build 184
Padl Software Nss Ldap Build 185
Padl Software Nss Ldap Build 189
Padl Software Pam Ldap Build 143
Padl Software Nss Ldap Build 181
Padl Software Nss Ldap Build 183
Padl Software Nss Ldap Build 187
Padl Software Nss Ldap Build 188
C-note Squid Auth Ldap 1.2 B2
C-note Squid Auth Ldap 2.0
Padl Software Nss Ldap Build 180
Padl Software Nss Ldap Build 185.3
Padl Software Nss Ldap Build 186
C-note Squid Auth Ldap 1.0.1
C-note Squid Auth Ldap 1.0.2 Beta
Padl Software Nss Ldap Build 185.1
Padl Software Nss Ldap Build 185.2
1.2
CVSSv2
CVE-2000-1045
nss_ldap earlier than 121, when run with nscd (name service caching daemon), allows remote malicious users to cause a denial of service via a flood of LDAP requests.
Padl Software Nss Ldap Build 105
Padl Software Nss Ldap Build 113
Padl Software Nss Ldap Build 85
7.5
CVSSv2
CVE-2002-0825
Buffer overflow in the DNS SRV code for nss_ldap before nss_ldap-198 allows remote malicious users to cause a denial of service and possibly execute arbitrary code.
Padl Software Nss Ldap
4.9
CVSSv2
CVE-2009-1073
nss-ldapd prior to 0.6.8 uses world-readable permissions for the /etc/nss-ldapd.conf file, which allows local users to obtain a cleartext password for the LDAP server by reading the bindpw field.
Debian Nss-ldap
Debian Debian Linux 5.0
6.8
CVSSv2
CVE-2013-0288
nss-pam-ldapd prior to 0.7.18 and 0.8.x prior to 0.8.11 allows context-dependent malicious users to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which ...
Arthurdejong Nss-pam-ldapd 0.8.2
Arthurdejong Nss-pam-ldapd 0.8.9
Arthurdejong Nss-pam-ldapd 0.8.7
Arthurdejong Nss-pam-ldapd 0.8.1
Arthurdejong Nss-pam-ldapd 0.8.5
Arthurdejong Nss-pam-ldapd 0.8.3
Arthurdejong Nss-pam-ldapd 0.8.0
Arthurdejong Nss-pam-ldapd 0.8.10
Arthurdejong Nss-pam-ldapd 0.8.4
Arthurdejong Nss-pam-ldapd 0.8.6
Arthurdejong Nss-pam-ldapd 0.8.8
Arthurdejong Nss-pam-ldapd 0.2.1
Arthurdejong Nss-pam-ldapd 0.6.10
Arthurdejong Nss-pam-ldapd 0.6.5
Arthurdejong Nss-pam-ldapd 0.7.10
Arthurdejong Nss-pam-ldapd 0.7.7
Arthurdejong Nss-pam-ldapd 0.7.15
Arthurdejong Nss-pam-ldapd 0.6.8
Arthurdejong Nss-pam-ldapd 0.6.7.1
Arthurdejong Nss-pam-ldapd 0.7.8
Arthurdejong Nss-pam-ldapd 0.6.0
Arthurdejong Nss-pam-ldapd 0.2
6.8
CVSSv2
CVE-2011-0438
nslcd/pam.c in the nss-pam-ldapd 0.8.0 PAM module returns a success code when a user is not found in LDAP, which allows remote malicious users to bypass authentication.
Arthurdejong Nss-pam-ldapd 0.8.0
5.8
CVSSv2
CVE-2009-3555
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and previous versions, OpenSSL prior to 0.9.8l, GnuTLS 2.8.5 and previous versions, Mozilla Network Security Ser...
Openssl Openssl 1.0
Apache Http Server
Openssl Openssl
Gnu Gnutls
Mozilla Nss
Debian Debian Linux 5.0
Canonical Ubuntu Linux 10.10
Fedoraproject Fedora 11
Fedoraproject Fedora 13
Debian Debian Linux 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 9.04
Debian Debian Linux 6.0
Fedoraproject Fedora 12
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Fedoraproject Fedora 14
F5 Nginx
2 EDB exploits
10 Github repositories
4.3
CVSSv2
CVE-2011-3389
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle malicious users...
Opera Opera Browser -
Microsoft Internet Explorer -
Microsoft Windows -
Google Chrome -
Mozilla Firefox -
Siemens Simatic Rf68xr Firmware
Siemens Simatic Rf615r Firmware
Haxx Curl
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 6.2
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
2 Github repositories
1 Article
5.5
CVSSv2
CVE-2022-22576
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL...
Haxx Curl
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Netapp Clustered Data Ontap -
Netapp Solidfire \\& Hci Management Node -
Netapp Solidfire \\& Hci Storage Node -
Brocade Fabric Operating System -
Netapp Bootstrap Os -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H410s Firmware -
Splunk Universal Forwarder 9.1.0
Splunk Universal Forwarder
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started