Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openldap openldap vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2004-1997
Kolab stores OpenLDAP passwords in plaintext in the slapd.conf file, which may be installed world-readable, which allows local users to gain privileges.
Kolab Kolab Groupware Server 1.0.7
Kolab Kolab Groupware Server 1.0.8
Kolab Kolab Groupware Server 1.0.5
Kolab Kolab Groupware Server 1.0.6
Kolab Kolab Groupware Server 1.0
Openpkg Openpkg 2.0
Kolab Kolab Groupware Server 1.0.1
Kolab Kolab Groupware Server 1.0.3
4.6
CVSSv2
CVE-2000-0748
OpenLDAP 1.2.11 and previous versions improperly installs the ud binary with group write permissions, which could allow any user in that group to replace the binary with a Trojan horse.
Openldap Openldap 1.2.10
Openldap Openldap 1.2.7
Openldap Openldap 1.2.8
Openldap Openldap 1.2.9
Openldap Openldap 1.2.11
4.3
CVSSv2
CVE-2014-8182
An off-by-one error leading to a crash exists in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses.
Openldap Openldap 2.4
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
4.3
CVSSv2
CVE-2013-5185
The ldapsearch command-line program in OpenLDAP in Apple Mac OS X prior to 10.9 does not properly process the minssf configuration setting, which allows remote malicious users to obtain sensitive information by leveraging unintended weak encryption and sniffing the network.
Apple Mac Os X
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Mac Os X 10.8.3
Apple Mac Os X 10.8.4
Apple Mac Os X 10.8.5
4.3
CVSSv2
CVE-2012-2668
libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and previous versions, when using the Mozilla NSS backend, always uses the default cipher suite even when TLSCipherSuite is set, which might cause OpenLDAP to use weaker ciphers than intended and make it easier for remote mal...
Openldap Openldap 2.4.17
Openldap Openldap 2.4.6
Openldap Openldap 2.4.11
Openldap Openldap 2.4.8
Openldap Openldap 2.4.26
Openldap Openldap 2.4.9
Openldap Openldap 2.4.16
Openldap Openldap
Openldap Openldap 2.4.29
Openldap Openldap 2.4.22
Openldap Openldap 2.4.25
Openldap Openldap 2.4.20
Openldap Openldap 2.4.15
Openldap Openldap 2.4.18
Openldap Openldap 2.4.27
Openldap Openldap 2.4.7
Openldap Openldap 2.4.28
Openldap Openldap 2.4.23
Openldap Openldap 2.4.24
Openldap Openldap 2.4.14
Openldap Openldap 2.4.19
Openldap Openldap 2.4.12
4.3
CVSSv2
CVE-2009-3767
libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle maliciou...
Openldap Openldap
Apple Mac Os X
Fedoraproject Fedora 11
4
CVSSv2
CVE-2020-15719
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat E...
Openldap Openldap
Redhat Enterprise Linux 8.0
Opensuse Leap 15.1
Opensuse Leap 15.2
Mcafee Policy Auditor
Oracle Blockchain Platform
4
CVSSv2
CVE-2014-9713
The default slapd configuration in the Debian openldap package 2.4.23-3 up to and including 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.
Openldap Openldap 2.4.23
Openldap Openldap 2.4.30
Openldap Openldap 2.4.24
Openldap Openldap 2.4.25
Openldap Openldap 2.4.32
Openldap Openldap 2.4.33
Openldap Openldap 2.4.26
Openldap Openldap 2.4.27
Openldap Openldap 2.4.34
Openldap Openldap 2.4.35
Openldap Openldap 2.4.31
Openldap Openldap 2.4.39
Openldap Openldap 2.4.28
Openldap Openldap 2.4.29
Openldap Openldap 2.4.36
Openldap Openldap 2.4.37
Openldap Openldap 2.4.38
Debian Debian Linux 7.0
4
CVSSv2
CVE-2011-4079
Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and previous versions allows remote malicious users to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddress...
Openldap Openldap 2.0.2
Openldap Openldap 2.0.11 11
Openldap Openldap 2.1.15
Openldap Openldap 2.1.10
Openldap Openldap 2.3.5
Openldap Openldap 2.2.4
Openldap Openldap 2.2.22
Openldap Openldap 2.3.31
Openldap Openldap 2.3.42
Openldap Openldap 2.1.29
Openldap Openldap 2.2.18
Openldap Openldap 2.1.9
Openldap Openldap 1.2.6
Openldap Openldap 1.1.2
Openldap Openldap 2.0.22
Openldap Openldap 2.4.17
Openldap Openldap 2.4.6
Openldap Openldap 2.0.9
Openldap Openldap 2.2.0
Openldap Openldap 2.3.32
Openldap Openldap 2.1.19
Openldap Openldap 1.0
4
CVSSv2
CVE-2008-0658
slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698.
Openldap Openldap 2.3.39
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »