httpd24-mod_ldap vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the httpd24-mod_ldap package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
HTTP Response Splitting

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • H
HTTP Response Splitting

<0:2.4.34-23.el7.6
  • M
HTTP Response Splitting

*
  • M
HTTP Request Smuggling

*
  • M
Out-of-bounds Read

*
  • M
Insufficient Verification of Data Authenticity

<0:2.4.34-23.el7.5
  • M
Allocation of Resources Without Limits or Throttling

<0:2.4.34-23.el7.5
  • M
Information Exposure

<0:2.4.34-23.el7.5
  • M
Allocation of Resources Without Limits or Throttling

<0:2.4.34-23.el7.5
  • M
Integer Overflow or Wraparound

<0:2.4.34-23.el7.5
  • M
Integer Overflow or Wraparound

<0:2.4.34-23.el7.5
  • M
HTTP Request Smuggling

<0:2.4.34-23.el7.5
  • M
Integer Overflow or Wraparound

<0:2.4.34-23.el7.5
  • M
Improper Initialization

<0:2.4.34-23.el7.5
  • H
HTTP Request Smuggling

<0:2.4.34-23.el7.2
  • M
Integer Overflow or Wraparound

<0:2.4.34-23.el7.5
  • H
Resource Exhaustion

<0:2.4.34-23.el7.1
  • M
NULL Pointer Dereference

<0:2.4.34-23.el7.5
  • H
NULL Pointer Dereference

<0:2.4.25-9.el7.1
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Buffer Overflow

<0:2.4.34-7.el7
  • M
Improper Input Validation

<0:2.4.25-9.el7
  • M
Use After Free

<0:2.4.34-7.el7
  • H
Improper Authentication

<0:2.4.18-11.el7
  • M
Resource Management Errors

<0:2.4.25-9.el7
  • M
Improper Input Validation

<0:2.4.12-6.el7.1
  • M
NULL Pointer Dereference

<0:2.4.12-6.el7.1
  • M
Resource Exhaustion

<0:2.4.34-7.el7
  • M
Improper Input Validation

<0:2.4.34-7.el7
  • M
Integer Overflow or Wraparound

<0:2.4.34-7.el7
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.34-22.el7.1
  • M
Out-of-bounds Write

<0:2.4.34-23.el7.5
  • M
Out-of-bounds Read

<0:2.4.34-23.el7.5
  • M
NULL Pointer Dereference

<0:2.4.34-23.el7.5
  • M
NULL Pointer Dereference

<0:2.4.34-23.el7.5
  • M
Improper Input Validation

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
NULL Pointer Dereference

<0:2.4.34-7.el7
  • M
Heap-based Buffer Overflow

<0:2.4.34-7.el7
  • M
Resource Exhaustion

<0:2.4.34-22.el7
  • M
Out-of-Bounds

<0:2.4.34-22.el7
  • M
Insufficient Session Expiration

<0:2.4.34-15.el7
  • M
Out-of-Bounds

*
  • L
Improper Handling of Syntactically Invalid Structure

*
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • H
Heap-based Buffer Overflow

<0:2.4.25-9.el7.1
  • M
Use After Free

<0:2.4.27-8.el7
  • H
Missing Initialization of a Variable

<0:2.4.25-9.el7.1
  • H
Out-of-bounds Read

<0:2.4.25-9.el7.1
  • H
Improper Authentication

<0:2.4.25-9.el7.1
  • H
NULL Pointer Dereference

<0:2.4.25-9.el7.1
  • M
Improper Input Validation

<0:2.4.25-9.el7
  • M
Improper Input Validation

<0:2.4.25-9.el7
  • M
Improper Authentication

<0:2.4.25-9.el7
  • M
Open Redirect

<0:2.4.34-18.el7
  • M
Resource Exhaustion

*
  • L
HTTP Request Smuggling

*
  • M
Use After Free

*
  • L
Use After Free

*
  • M
Buffer Overflow

<0:2.4.34-15.el7
  • M
Resource Exhaustion

<0:2.4.34-15.el7
  • H
Improper Input Validation

<0:2.4.18-11.el7
  • H
Resource Exhaustion

<0:2.4.34-18.el7.1
  • M
Improper Authentication

<0:2.4.12-6.el7.1
  • M
Encoding Error

<0:2.4.12-6.el7.1
  • L
NULL Pointer Dereference

<0:2.4.6-25.el7
  • L
Improper Authentication

<0:2.4.6-25.el7
  • H
Resource Management Errors

<0:2.4.6-21.el7
  • H
Improper Synchronization

<0:2.4.6-21.el7
  • H
Resource Exhaustion

<0:2.4.6-21.el7
  • H
Improper Input Validation

<0:2.4.6-21.el7
  • H
NULL Pointer Dereference

<0:2.4.6-21.el7
  • M
Insufficient Verification of Data Authenticity

<0:2.4.25-9.el7
  • L
Missing Initialization of a Variable

*
  • M
Open Redirect

<0:2.4.34-18.el7
  • M
Improper Access Control

<0:2.4.34-15.el7
  • M
Path Equivalence

<0:2.4.34-15.el7
  • H
Resource Exhaustion

<0:2.4.34-8.el7.1
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • H
Resource Exhaustion

<0:2.4.34-8.el7.1
  • H
Resource Exhaustion

<0:2.4.34-8.el7.1
  • M
Incorrect Calculation of Buffer Size

<0:2.4.34-7.el7
  • M
Authentication Bypass by Primary Weakness

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Cross-site Scripting (XSS)

<0:2.4.34-15.el7
  • M
Out-of-bounds Write

<0:2.4.34-7.el7
  • M
Information Exposure

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • H
Authentication Bypass by Primary Weakness

<0:2.4.34-7.el7.1
  • M
Out-of-bounds Write

<0:2.4.34-7.el7
  • M
Out-of-bounds Write

<0:2.4.34-7.el7
  • H
Execution with Unnecessary Privileges

<0:2.4.34-7.el7.1
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Improper Authentication

<0:2.4.34-7.el7
  • M
Improper Input Validation

*
  • M
Heap-based Buffer Overflow

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Improper Certificate Validation

<0:2.4.34-7.el7
  • M
Improper Input Validation

<0:2.4.34-7.el7
  • M
Use After Free

<0:2.4.34-7.el7
  • M
Improper Input Validation

<0:2.4.34-7.el7
  • M
Integer Overflow or Wraparound

<0:2.4.34-7.el7
  • M
Use After Free

<0:2.4.34-7.el7
  • M
Out-of-bounds Write

<0:2.4.34-7.el7
  • M
Integer Overflow or Wraparound

<0:2.4.34-7.el7
  • M
Use After Free

<0:2.4.34-7.el7
  • M
Resource Injection

<0:2.4.34-7.el7
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
Improper Certificate Validation

<0:2.4.34-7.el7
  • M
Improper Certificate Validation

<0:2.4.34-7.el7
  • L
Out-of-Bounds

*
  • M
Improper Authentication

*
  • L
Access Restriction Bypass

*