389ds/389-ds-base vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|389ds/389-ds-base package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Input Validation

[0,)
  • M
Improper Handling of Missing Values

[,2.4.5)
  • M
Improper Validation of Consistency within Input

[0,)
  • M
Improper Input Validation

[,1.3.11.1)
  • H
Improper Input Validation

[,2.5.1)
  • M
Heap-based Buffer Overflow

[0,)
  • M
Information Exposure

[0,)
  • H
NULL Pointer Dereference

[0,)
  • H
Access Restriction Bypass

[1.3.0,)
  • H
Access Restriction Bypass

[,2.0.7)
  • M
Improper Authentication

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[1.3.6.4,)
  • H
Access Restriction Bypass

[1.2.1,1.2.8]
  • M
Improper Input Validation

[,1.2.8.1)
  • M
Information Exposure

[1.2.1,1.3.0.8]
  • L
Cryptographic Issues

[,1.2.11.6)
  • H
Improper Authentication

[1.3.6.1,1.4.0.4)
  • H
Double Free

[,1.3.8.4)
  • H
Memory Leak

[,1.4.0.24)[1.4.0.4,1.4.1.4)
  • H
Resource Management Errors

[0,1.3.4.7)
  • H
Out-of-Bounds

[1.3.6.1,1.3.6.13)[1.3.7.1,1.3.7.9)[1.4.0.0,1.4.0.5)
  • H
Out-of-bounds Read

[,1.4.0.7)
  • M
Information Exposure

[,1.3.2.27)
  • L
Insufficiently Protected Credentials

[,1.2.7.1)
  • H
Out-of-bounds Read

[,1.3.6)
  • M
Improper Input Validation

[,1.2.7.5]
  • L
Access Restriction Bypass

[,1.2.11.20)[1.3.0.0,1.3.0.5)
  • H
Denial of Service (DoS)

[1.4.0.0,1.4.0.17)
  • M
Denial of Service (DoS)

[,1.3.0.4)
  • M
Improper Input Validation

[,1.2.11.15]
  • H
Improper Access Control

[,1.3.3.10)
  • H
Improper Input Validation

[,1.3.7.10][1.3.8.0,1.3.8.8][1.4.0.0,)
  • H
Improper Input Validation

[,1.2.7.5]
  • M
Information Exposure

[,1.3.2.27)[1.3.3.0,1.3.3.9)
  • M
NULL Pointer Dereference

[1.3.5.0,1.3.5.17)[1.3.6.0,1.3.6.10)
  • H
Resource Management Errors

[,1.4.0.17)
  • M
Improper Input Validation

[,1.3.0.8)
  • M
Resource Management Errors

[,1.2.7.5)
  • M
Resource Management Errors

[1.2.1,1.2.8]
  • H
Security Features

[,1.3.3.11)
  • H
Improper Input Validation

[1.3.6.0,1.3.6.15)[1.4.0.0,1.4.0.9)
  • L
Access Restriction Bypass

[,1.2.10.2)
  • M
Improper Authentication

[,1.2.11.26)
  • M
Information Exposure

[1.4.0.0,1.4.1.3)
  • L
Cryptographic Issues

[,1.2.11.6)
  • H
Information Exposure

[,1.3.8.5)[1.4.0.0,1.4.0.12)
  • M
Race Condition

[,1.4.0.10)
  • M
Information Exposure

[,1.4.3.19)[1.4.4.0,1.4.4.13)[2.0.0,2.0.3)