Page 8 of 37 results (0.003 seconds)

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 0

Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname. • http://secunia.com/advisories/20126 http://secunia.com/advisories/20495 http://secunia.com/advisories/20685 http://secunia.com/advisories/20848 http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml http://www.mandriva.com/security/advisories?name=MDKSA-2006:096 http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21&r2=1.22&hideattic=1&sortbydate=0&f=h http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1&sortbydate=0#rev1.22&# •

CVSS: 7.2EPSS: 0%CPEs: 82EXPL: 0

Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH. • http://secunia.com/advisories/18040 http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml http://www.securityfocus.com/bid/15120 •