freeradius-ldap vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the freeradius-ldap package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Authentication Bypass

<0:3.0.20-1.el7_9.1
  • M
Unsynchronized Access to Shared Data in a Multithreaded Context

<0:3.0.13-15.el7
  • M
Information Exposure

<0:3.0.13-15.el7
  • M
Incorrect Privilege Assignment

<0:3.0.13-15.el7
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Insufficiently Protected Credentials

*
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Read

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Out-of-bounds Write

<0:3.0.13-8.el7_4
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • H
Improper Authentication

<0:3.0.4-8.el7_3
  • M
Unsynchronized Access to Shared Data in a Multithreaded Context

<0:3.0.13-15.el7
  • M
Information Exposure

<0:3.0.13-15.el7
  • M
Incorrect Privilege Assignment

<0:3.0.13-15.el7
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Improper Authentication

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.13-10.el7_6
  • L
Missing Initialization of a Variable

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Check for Certificate Revocation

*