Количество 8
Количество 8
CVE-2020-15719
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
CVE-2020-15719
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
CVE-2020-15719
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
CVE-2020-15719
libldap in certain third-party OpenLDAP packages has a certificate-val ...
openSUSE-SU-2020:1459-1
Security update for openldap2
openSUSE-SU-2020:1416-1
Security update for openldap2
SUSE-SU-2020:2581-1
Security update for openldap2
GHSA-pg7h-v386-fw8h
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-15719 libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux. | CVSS3: 4.2 | 0% Низкий | больше 5 лет назад | |
CVE-2020-15719 libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux. | CVSS3: 4.2 | 0% Низкий | больше 6 лет назад | |
CVE-2020-15719 libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux. | CVSS3: 4.2 | 0% Низкий | больше 5 лет назад | |
CVE-2020-15719 libldap in certain third-party OpenLDAP packages has a certificate-val ... | CVSS3: 4.2 | 0% Низкий | больше 5 лет назад | |
openSUSE-SU-2020:1459-1 Security update for openldap2 | 0% Низкий | больше 5 лет назад | ||
openSUSE-SU-2020:1416-1 Security update for openldap2 | 0% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:2581-1 Security update for openldap2 | 0% Низкий | больше 5 лет назад | ||
GHSA-pg7h-v386-fw8h libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux. | CVSS3: 4.2 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу