4 results (0.016 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Unknown vulnerability in pam_ldap before 180 does not properly handle a new password policy control, which could allow attackers to gain privileges. NOTE: CVE-2005-2497 had also been assigned to this issue, but CVE-2005-2641 is the correct candidate. • http://secunia.com/advisories/17233 http://secunia.com/advisories/17270 http://www.kb.cert.org/vuls/id/778916 http://www.mandriva.com/security/advisories?name=MDKSA-2005:190 http://www.redhat.com/support/errata/RHSA-2005-767.html http://www.securityfocus.com/archive/1/447859/100/200/threaded http://www.securityfocus.com/bid/14649 https://issues.rpath.com/browse/RPL-680 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10370 https://w •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in the pam_filter mechanism in pam_ldap before version 162, when LDAP based authentication is being used, allows users to bypass host-based access restrictions and log onto the system. • http://www.mandriva.com/security/advisories?name=MDKSA-2003:088 •

CVSS: 7.5EPSS: 5%CPEs: 17EXPL: 0

Format string vulnerability in the logging() function in C-Note Squid LDAP authentication module (squid_auth_LDAP) 2.0.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code by triggering log messages. Vulnerabilidad de cadena de formato en la función logging() en el módulo de autenticación de C-Note Squid LDAP 2.0.2 y anteriores permite que un atacante remoto provoque una denegación de servicio y, posiblemente, ejecute código arbitrario desencadenando mensajes de log. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0053.html http://marc.info/?l=vuln-dev&m=102070267500932&w=2 http://online.securityfocus.com/archive/1/271173 http://www.iss.net/security_center/static/9019.php http://www.securityfocus.com/bid/4679 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Format string vulnerability in the logging function for the pam_ldap PAM LDAP module before version 144 allows attackers to execute arbitrary code via format strings in the configuration file name. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-041.0.txt http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0053.html http://marc.info/?l=bugtraq&m=103601912505261&w=2 http://www.iss.net/security_center/static/9018.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:075 http://www.redhat.com/support/errata/RHSA-2002-084.html http://www.redhat.com/support/errata/RHSA-2002-141.html http://www.redhat.com/support/errata/RHSA-2002-175.html http •