ipa-server-trust-ad vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ipa-server-trust-ad package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use of Password Hash With Insufficient Computational Effort

<0:4.6.8-5.el7_9.17
  • H
Incorrect Authorization

*
  • M
Improper Input Validation

*
  • M
Cross-site Request Forgery (CSRF)

<0:4.6.8-5.el7_9.16
  • M
Improper Authentication

<0:4.6.8-5.el7_9.10
  • M
Improper Input Validation

*
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.4.0-14.el7_3.6
  • M
Incorrect Authorization

<0:4.4.0-14.el7_3.1.1
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Improper Authorization

<0:4.2.0-15.el7_2.19
  • C
Improper Certificate Validation

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
Authentication Bypass

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • C
CVE-2015-5370

<0:4.2.0-15.el7_2.6.1
  • C
Man-in-the-Middle (MitM)

<0:4.2.0-15.el7_2.6.1
  • M
Incorrect Calculation of Buffer Size

<0:4.1.0-18.el7_1.3
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.1.0-18.el7_1.3
  • M
Cross-site Scripting (XSS)

<0:4.1.0-18.el7
  • M
Cross-site Scripting (XSS)

<0:4.1.0-18.el7
  • M
Resource Exhaustion

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7_9.4
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • M
Cross-site Scripting (XSS)

<0:4.6.8-5.el7
  • H
Arbitrary Code Injection

<0:4.6.5-11.el7_7.4
  • H
Information Exposure Through Log Files

<0:4.6.5-11.el7_7.4
  • L
Information Exposure

*
  • M
Credentials Management

<0:4.4.0-14.el7_3.1.1
  • L
Insufficient Session Expiration

*
  • M
Cross-site Scripting (XSS)

*