openldap vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openldap package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
NULL Pointer Dereference

*
  • M
SQL Injection

*
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
NULL Pointer Dereference

<0:2.4.44-23.el7_9
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

<0:2.4.44-22.el7
  • M
Reachable Assertion

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • M
Integer Underflow

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Reachable Assertion

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Reachable Assertion

<0:2.4.44-25.el7_9
  • M
Reachable Assertion

<0:2.4.44-25.el7_9
  • M
Improper Access Control

*
  • M
Information Exposure

*
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • L
Improper Validation of Certificate with Host Mismatch

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7