Page 6 of 59 results (0.007 seconds)

CVSS: 9.1EPSS: 1%CPEs: 70EXPL: 0

07 Sep 2004 — OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. • http://secunia.com/advisories/12491 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

20 Mar 2003 — ldbm_back_exop_passwd in the back-ldbm backend in passwd.c for OpenLDAP 2.1.12 and earlier, when the slap_passwd_parse function does not return LDAP_SUCCESS, attempts to free an uninitialized pointer, which allows remote attackers to cause a denial of service (segmentation fault). • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000685 • CWE-824: Access of Uninitialized Pointer •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

11 Feb 2003 — slapd in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows local users to overwrite arbitrary files via a race condition during the creation of a log file for rejected replication requests. slapd en OpenLDAP2 (OpenLDAP 2) 2.2.0 y anteriores permiten a usuarios locales sobreescribir ficheros arbitrarios mediante una condición de carrera durante la creación de un fichero de registro de peticiones de replicación rechazadas. • http://www.debian.org/security/2003/dsa-227 •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 0

17 Dec 2002 — Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests. Múltiples desbordamientos de búfer en OpenLD... • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000556 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Dec 2002 — OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges. Múltiples vulnerabilidades desconocidas en OpenLDAP2 (OpenLDAP2) 2.2.0 y anteriores, que no son desbordamientos de búfer como los descritos en CAN-2002-1378, permiten atacantes remotos o locales ejecutar código arbitrario. • http://www.debian.org/security/2003/dsa-227 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

31 Jan 2002 — slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a "replace" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs. sldap en OpenLDAP 2.0 a 2.0.19 permite a usuarios locales, y a usuarios anónimos en versiones anteriores a 2.0.8, llevar a cabo una acción "replace" en controles de acceso sin valores, lo que causa que OpenLDAP borre atributos no mandatorios que de otr... • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-001.0.txt •

CVSS: 7.5EPSS: 2%CPEs: 39EXPL: 0

16 Jul 2001 — slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000417 •

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

21 Sep 2000 — OpenLDAP 1.2.11 and earlier improperly installs the ud binary with group write permissions, which could allow any user in that group to replace the binary with a Trojan horse. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0375.html •

CVSS: 5.5EPSS: 0%CPEs: 15EXPL: 1

21 Apr 2000 — Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/19946 •