VAR-202105-0131

Vulnerability from variot - Updated: 2025-12-22 21:29

A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability. OpenLDAP Exists in a reachable assertion vulnerability.Denial of service (DoS) It may be put into a state.

For the stable distribution (buster), these problems have been fixed in version 2.4.47+dfsg-3+deb10u4.

We recommend that you upgrade your openldap packages.

For the detailed security status of openldap please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openldap

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl+z4tVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SNdg/+MsAEvlGb4gdmG6AhDXi8vsdo0p9ksR0OWQZDn0QRvmxynwuoKO61EJoE z6L1tXGb5OQSUho2MJ4BVNi69yMxbSJxmXzU1NJ8W6m8v6CwEiR9q3I4XtE+8cXi yQqXZJgkt03s5Bph340mkOylLIJCpkLNDsl+0QI/NL7Utsv87cciYs2O9AgMYfW4 jO8sMvq4zfncr4G92F47SbAsmfsiAZON1qpF9WbZZCGsEEvSWnEYVkMBpYP0JbYt pP1G/Mgc5UKcIyfs7CzGJGfxw3n03J8BzS1PorTz0VtuD5YeBThLMkH80UUnahyC sy25FmepUTBLbfR2TY6FMzF6VEFQvJ37mOuYw46lQzPj4hhNLUgkOESAN1nOxN/b xYW0kRmj9sXph0vP4iEnIt6zAK2+s/AuVYPoYhmE8tt2paNDN9LyDkrQpfK42T/6 o3+pweSy1Icz85u5M4TeaavZfhaiafuyKHSzamklRe/1q4KZXUQxf2ozEgdUDEi5 HJixeb+8AZlgdoRQ8ZVoHPj8SospYnzmTRw0v2ciNDvnUNUVv3lMnnCSAHmBqEDo 5er0WxfTKtpvbgfl+2qSj/I5Ou1FSz71nfySphNVCTM5gANdDgviEQmhPXBuMp6Z HPwcTUGWiEA7ARi7XTi/dYDAi6XMqEoZmKrDUBoQNW41GAZxJJA= =zqnQ -----END PGP SIGNATURE----- . Summary:

The Migration Toolkit for Containers (MTC) 1.5.4 is now available. Description:

The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/):

1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic

  1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.2.11 General Availability release images, which provide one or more container updates and bug fixes. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.2.11 images

Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments.

Clusters and applications are all visible and managed from a single console — with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide security fixes, bug fixes and container upgrades. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/

Security updates:

  • object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 (CVE-2021-23434)

  • follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155)

Related bugs:

  • RHACM 2.2.11 images (Bugzilla #2029508)

  • ClusterImageSet has 4.5 which is not supported in ACM 2.2.10 (Bugzilla

2030859)

  1. Bugs fixed (https://bugzilla.redhat.com/):

1999810 - CVE-2021-23434 object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 2029508 - RHACM 2.2.11 images 2030859 - ClusterImageSet has 4.5 which is not supported in ACM 2.2.10 2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor

  1. Description:

Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/):

2062751 - CVE-2022-24730 argocd: path traversal and improper access control allows leaking out-of-bound files 2062755 - CVE-2022-24731 argocd: path traversal allows leaking out-of-bound files 2064682 - CVE-2022-1025 Openshift-Gitops: Improper access control allows admin privilege escalation

  1. ========================================================================= Ubuntu Security Notice USN-4634-2 November 23, 2020

openldap vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM

Summary:

OpenLDAP could be made to crash if it received specially crafted network traffic. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that OpenLDAP incorrectly handled certain malformed inputs. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM: slapd 2.4.31-1+nmu2ubuntu8.5+esm4

Ubuntu 12.04 ESM: slapd 2.4.28-1.1ubuntu4.12

In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: openldap security update Advisory ID: RHSA-2022:0621-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:0621 Issue date: 2022-02-22 CVE Names: CVE-2020-25709 CVE-2020-25710 =====================================================================

  1. Summary:

An update for openldap is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network.

Security Fix(es):

  • openldap: assertion failure in Certificate List syntax validation (CVE-2020-25709)

  • openldap: assertion failure in CSN normalization with invalid input (CVE-2020-25710)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1899675 - CVE-2020-25709 openldap: assertion failure in Certificate List syntax validation 1899678 - CVE-2020-25710 openldap: assertion failure in CSN normalization with invalid input

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: openldap-2.4.44-25.el7_9.src.rpm

x86_64: openldap-2.4.44-25.el7_9.i686.rpm openldap-2.4.44-25.el7_9.x86_64.rpm openldap-clients-2.4.44-25.el7_9.x86_64.rpm openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-devel-2.4.44-25.el7_9.i686.rpm openldap-devel-2.4.44-25.el7_9.x86_64.rpm openldap-servers-2.4.44-25.el7_9.x86_64.rpm openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: openldap-2.4.44-25.el7_9.src.rpm

x86_64: openldap-2.4.44-25.el7_9.i686.rpm openldap-2.4.44-25.el7_9.x86_64.rpm openldap-clients-2.4.44-25.el7_9.x86_64.rpm openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-devel-2.4.44-25.el7_9.i686.rpm openldap-devel-2.4.44-25.el7_9.x86_64.rpm openldap-servers-2.4.44-25.el7_9.x86_64.rpm openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: openldap-2.4.44-25.el7_9.src.rpm

ppc64: openldap-2.4.44-25.el7_9.ppc.rpm openldap-2.4.44-25.el7_9.ppc64.rpm openldap-clients-2.4.44-25.el7_9.ppc64.rpm openldap-debuginfo-2.4.44-25.el7_9.ppc.rpm openldap-debuginfo-2.4.44-25.el7_9.ppc64.rpm openldap-devel-2.4.44-25.el7_9.ppc.rpm openldap-devel-2.4.44-25.el7_9.ppc64.rpm openldap-servers-2.4.44-25.el7_9.ppc64.rpm

ppc64le: openldap-2.4.44-25.el7_9.ppc64le.rpm openldap-clients-2.4.44-25.el7_9.ppc64le.rpm openldap-debuginfo-2.4.44-25.el7_9.ppc64le.rpm openldap-devel-2.4.44-25.el7_9.ppc64le.rpm openldap-servers-2.4.44-25.el7_9.ppc64le.rpm

s390x: openldap-2.4.44-25.el7_9.s390.rpm openldap-2.4.44-25.el7_9.s390x.rpm openldap-clients-2.4.44-25.el7_9.s390x.rpm openldap-debuginfo-2.4.44-25.el7_9.s390.rpm openldap-debuginfo-2.4.44-25.el7_9.s390x.rpm openldap-devel-2.4.44-25.el7_9.s390.rpm openldap-devel-2.4.44-25.el7_9.s390x.rpm openldap-servers-2.4.44-25.el7_9.s390x.rpm

x86_64: openldap-2.4.44-25.el7_9.i686.rpm openldap-2.4.44-25.el7_9.x86_64.rpm openldap-clients-2.4.44-25.el7_9.x86_64.rpm openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-devel-2.4.44-25.el7_9.i686.rpm openldap-devel-2.4.44-25.el7_9.x86_64.rpm openldap-servers-2.4.44-25.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: openldap-debuginfo-2.4.44-25.el7_9.ppc64.rpm openldap-servers-sql-2.4.44-25.el7_9.ppc64.rpm

ppc64le: openldap-debuginfo-2.4.44-25.el7_9.ppc64le.rpm openldap-servers-sql-2.4.44-25.el7_9.ppc64le.rpm

s390x: openldap-debuginfo-2.4.44-25.el7_9.s390x.rpm openldap-servers-sql-2.4.44-25.el7_9.s390x.rpm

x86_64: openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: openldap-2.4.44-25.el7_9.src.rpm

x86_64: openldap-2.4.44-25.el7_9.i686.rpm openldap-2.4.44-25.el7_9.x86_64.rpm openldap-clients-2.4.44-25.el7_9.x86_64.rpm openldap-debuginfo-2.4.44-25.el7_9.i686.rpm openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-devel-2.4.44-25.el7_9.i686.rpm openldap-devel-2.4.44-25.el7_9.x86_64.rpm openldap-servers-2.4.44-25.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: openldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-25709 https://access.redhat.com/security/cve/CVE-2020-25710 https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYhVgl9zjgjWX9erEAQizoA//Z1eRFFiALCnBNdscadCiTK27uxUBYwiE mazVTDFOQUIzF2+hpruaDD0RJoIuZL8JwTPviUZJbB21G8NIF5T09eP00ErioZEN WMeccz1GyZlUXWZXBvf3v5QOMOmhBK3vw80X6oVCzGZbzMynCtPI8+jCt/MmzA0y fpLghp4rd7o56kF3ccb3ZbLREFNYFwyNqzVT79LA0KdA2KnMY/pFBTSmY8ihiTTJ qvIekeg+Xj5t85JObesMRwM1yrEG+joYcXe9uqRjOLvCGPdXSM5YMcOxNyNynjnI EGIqGr9/+2OVxhHCLaITvuBaqPeIgCZxO9yvKgoNDsuBpDUEKgv+iQ1l0DnfIThr ppeoo+MeNMB54Qw+qf9MQblhLFFS08zUNXq7YsJi58kIp6PEtj2Q/7DvVMY6GcPN 3hltIwlWAY4+PToSbt9UvJEmAdH1ApN0XSiBva6e295C92v1IvDYN0BkD8XouOAH 5tKXXheyJfoN6vjJG89halj6gzy4IcPU5KkfJuJO3vKJeDkG3vRoySIxW0SDrdS8 +4XGwe6e00D/Kd1t9yXIeITCCtiK3NZS5bMsOHclxzbrGeWj4YK/jK7CfK5g+Zt0 0PKI5pZqGdc3SwDNo165BVDChTc7HZqjmp6LFYzKyBSkwgdHzGG/soj51hWqyVui UnjGg9lAM38= =OWtf -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202105-0131",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.14.0"
      },
      {
        "model": "macos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "11.0.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.14.6"
      },
      {
        "model": "mac os x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.14.6"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "mac os x",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.15"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.15.7"
      },
      {
        "model": "macos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "11.0"
      },
      {
        "model": "mac os x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.15.7"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "jboss core services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": null
      },
      {
        "model": "openldap",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "openldap",
        "version": "2.4.56"
      },
      {
        "model": "openldap",
        "scope": null,
        "trust": 0.8,
        "vendor": "openldap",
        "version": null
      },
      {
        "model": "macos big sur",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a2\u30c3\u30d7\u30eb",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "jboss core services",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "apple mac os x",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a2\u30c3\u30d7\u30eb",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25709"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2020-25709",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2020-25709",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-179714",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-25709",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2020-25709",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-25709",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2020-25709",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202011-1517",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-179714",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-25709",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-179714"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-25709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25709"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability. OpenLDAP Exists in a reachable assertion vulnerability.Denial of service (DoS) It may be put into a state. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 2.4.47+dfsg-3+deb10u4. \n\nWe recommend that you upgrade your openldap packages. \n\nFor the detailed security status of openldap please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/openldap\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nHPwcTUGWiEA7ARi7XTi/dYDAi6XMqEoZmKrDUBoQNW41GAZxJJA=\n=zqnQ\n-----END PGP SIGNATURE-----\n. Summary:\n\nThe Migration Toolkit for Containers (MTC) 1.5.4 is now available. Description:\n\nThe Migration Toolkit for Containers (MTC) enables you to migrate\nKubernetes resources, persistent volume data, and internal container images\nbetween OpenShift Container Platform clusters, using the MTC web console or\nthe Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/):\n\n1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic\n\n5. Summary:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.2.11 General\nAvailability release images, which provide one or more container updates\nand bug fixes. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.2.11 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. \n\nClusters and applications are all visible and managed from a single console\n\u2014 with security policy built in. \n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which provide security fixes, bug fixes and\ncontainer upgrades. See the following Release Notes documentation, which\nwill be updated shortly for this release, for additional details about this\nrelease:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/\n\nSecurity updates:\n\n* object-path: Type confusion vulnerability can lead to a bypass of\nCVE-2020-15256 (CVE-2021-23434)\n\n* follow-redirects: Exposure of Private Personal Information to an\nUnauthorized Actor (CVE-2022-0155)\n\nRelated bugs: \n\n* RHACM 2.2.11 images (Bugzilla #2029508)\n\n* ClusterImageSet has 4.5 which is not supported in ACM 2.2.10 (Bugzilla\n#2030859)\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1999810 - CVE-2021-23434 object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256\n2029508 - RHACM 2.2.11 images\n2030859 - ClusterImageSet has 4.5 which is not supported in ACM 2.2.10\n2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor\n\n5. Description:\n\nRed Hat Openshift GitOps is a declarative way to implement continuous\ndeployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/):\n\n2062751 - CVE-2022-24730 argocd: path traversal and improper access control allows leaking out-of-bound files\n2062755 - CVE-2022-24731 argocd: path traversal allows leaking out-of-bound files\n2064682 - CVE-2022-1025 Openshift-Gitops: Improper access control allows admin privilege escalation\n\n5. =========================================================================\nUbuntu Security Notice USN-4634-2\nNovember 23, 2020\n\nopenldap vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 ESM\n- Ubuntu 12.04 ESM\n\nSummary:\n\nOpenLDAP could be made to crash if it received specially crafted network\ntraffic. This update provides\nthe corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. \n\nOriginal advisory details:\n\n It was discovered that OpenLDAP incorrectly handled certain malformed\n inputs. A remote attacker could possibly use this issue to cause OpenLDAP\n to crash, resulting in a denial of service. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 ESM:\n  slapd                           2.4.31-1+nmu2ubuntu8.5+esm4\n\nUbuntu 12.04 ESM:\n  slapd                           2.4.28-1.1ubuntu4.12\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: openldap security update\nAdvisory ID:       RHSA-2022:0621-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2022:0621\nIssue date:        2022-02-22\nCVE Names:         CVE-2020-25709 CVE-2020-25710 \n=====================================================================\n\n1. Summary:\n\nAn update for openldap is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenLDAP is an open-source suite of Lightweight Directory Access Protocol\n(LDAP) applications and development tools. LDAP is a set of protocols used\nto access and maintain distributed directory information services over an\nIP network. \n\nSecurity Fix(es):\n\n* openldap: assertion failure in Certificate List syntax validation\n(CVE-2020-25709)\n\n* openldap: assertion failure in CSN normalization with invalid input\n(CVE-2020-25710)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1899675 - CVE-2020-25709 openldap: assertion failure in Certificate List syntax validation\n1899678 - CVE-2020-25710 openldap: assertion failure in CSN normalization with invalid input\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenldap-2.4.44-25.el7_9.src.rpm\n\nx86_64:\nopenldap-2.4.44-25.el7_9.i686.rpm\nopenldap-2.4.44-25.el7_9.x86_64.rpm\nopenldap-clients-2.4.44-25.el7_9.x86_64.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.i686.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenldap-debuginfo-2.4.44-25.el7_9.i686.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm\nopenldap-devel-2.4.44-25.el7_9.i686.rpm\nopenldap-devel-2.4.44-25.el7_9.x86_64.rpm\nopenldap-servers-2.4.44-25.el7_9.x86_64.rpm\nopenldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenldap-2.4.44-25.el7_9.src.rpm\n\nx86_64:\nopenldap-2.4.44-25.el7_9.i686.rpm\nopenldap-2.4.44-25.el7_9.x86_64.rpm\nopenldap-clients-2.4.44-25.el7_9.x86_64.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.i686.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenldap-debuginfo-2.4.44-25.el7_9.i686.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm\nopenldap-devel-2.4.44-25.el7_9.i686.rpm\nopenldap-devel-2.4.44-25.el7_9.x86_64.rpm\nopenldap-servers-2.4.44-25.el7_9.x86_64.rpm\nopenldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenldap-2.4.44-25.el7_9.src.rpm\n\nppc64:\nopenldap-2.4.44-25.el7_9.ppc.rpm\nopenldap-2.4.44-25.el7_9.ppc64.rpm\nopenldap-clients-2.4.44-25.el7_9.ppc64.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.ppc.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.ppc64.rpm\nopenldap-devel-2.4.44-25.el7_9.ppc.rpm\nopenldap-devel-2.4.44-25.el7_9.ppc64.rpm\nopenldap-servers-2.4.44-25.el7_9.ppc64.rpm\n\nppc64le:\nopenldap-2.4.44-25.el7_9.ppc64le.rpm\nopenldap-clients-2.4.44-25.el7_9.ppc64le.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.ppc64le.rpm\nopenldap-devel-2.4.44-25.el7_9.ppc64le.rpm\nopenldap-servers-2.4.44-25.el7_9.ppc64le.rpm\n\ns390x:\nopenldap-2.4.44-25.el7_9.s390.rpm\nopenldap-2.4.44-25.el7_9.s390x.rpm\nopenldap-clients-2.4.44-25.el7_9.s390x.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.s390.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.s390x.rpm\nopenldap-devel-2.4.44-25.el7_9.s390.rpm\nopenldap-devel-2.4.44-25.el7_9.s390x.rpm\nopenldap-servers-2.4.44-25.el7_9.s390x.rpm\n\nx86_64:\nopenldap-2.4.44-25.el7_9.i686.rpm\nopenldap-2.4.44-25.el7_9.x86_64.rpm\nopenldap-clients-2.4.44-25.el7_9.x86_64.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.i686.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm\nopenldap-devel-2.4.44-25.el7_9.i686.rpm\nopenldap-devel-2.4.44-25.el7_9.x86_64.rpm\nopenldap-servers-2.4.44-25.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenldap-debuginfo-2.4.44-25.el7_9.ppc64.rpm\nopenldap-servers-sql-2.4.44-25.el7_9.ppc64.rpm\n\nppc64le:\nopenldap-debuginfo-2.4.44-25.el7_9.ppc64le.rpm\nopenldap-servers-sql-2.4.44-25.el7_9.ppc64le.rpm\n\ns390x:\nopenldap-debuginfo-2.4.44-25.el7_9.s390x.rpm\nopenldap-servers-sql-2.4.44-25.el7_9.s390x.rpm\n\nx86_64:\nopenldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm\nopenldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenldap-2.4.44-25.el7_9.src.rpm\n\nx86_64:\nopenldap-2.4.44-25.el7_9.i686.rpm\nopenldap-2.4.44-25.el7_9.x86_64.rpm\nopenldap-clients-2.4.44-25.el7_9.x86_64.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.i686.rpm\nopenldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm\nopenldap-devel-2.4.44-25.el7_9.i686.rpm\nopenldap-devel-2.4.44-25.el7_9.x86_64.rpm\nopenldap-servers-2.4.44-25.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenldap-debuginfo-2.4.44-25.el7_9.x86_64.rpm\nopenldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-25709\nhttps://access.redhat.com/security/cve/CVE-2020-25710\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nUnjGg9lAM38=\n=OWtf\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      },
      {
        "db": "VULHUB",
        "id": "VHN-179714"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-25709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168945"
      },
      {
        "db": "PACKETSTORM",
        "id": "166789"
      },
      {
        "db": "PACKETSTORM",
        "id": "166309"
      },
      {
        "db": "PACKETSTORM",
        "id": "166437"
      },
      {
        "db": "PACKETSTORM",
        "id": "160180"
      },
      {
        "db": "PACKETSTORM",
        "id": "166119"
      },
      {
        "db": "PACKETSTORM",
        "id": "160109"
      }
    ],
    "trust": 2.43
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-179714",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-179714"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-25709",
        "trust": 4.1
      },
      {
        "db": "PACKETSTORM",
        "id": "166437",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "160180",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "166119",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "166309",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "160109",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "161245",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "166789",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.1263",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0779",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.1071",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4187",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0349",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.3348",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4077",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0196",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.4301",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.1677",
        "trust": 0.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-22-116-01",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022072111",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022070813",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022022228",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022032445",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022022527",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202011-1517",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "166431",
        "trust": 0.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-65147",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-179714",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-25709",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168945",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-179714"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-25709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168945"
      },
      {
        "db": "PACKETSTORM",
        "id": "166789"
      },
      {
        "db": "PACKETSTORM",
        "id": "166309"
      },
      {
        "db": "PACKETSTORM",
        "id": "166437"
      },
      {
        "db": "PACKETSTORM",
        "id": "160180"
      },
      {
        "db": "PACKETSTORM",
        "id": "166119"
      },
      {
        "db": "PACKETSTORM",
        "id": "160109"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25709"
      }
    ]
  },
  "id": "VAR-202105-0131",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-179714"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-12-22T21:29:05.048000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HT212147 Red hat Red\u00a0Hat\u00a0Bugzilla",
        "trust": 0.8,
        "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html"
      },
      {
        "title": "OpenLDAP Certificate List Syntax Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=135752"
      },
      {
        "title": "Red Hat: Moderate: openldap security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20220621 - Security Advisory"
      },
      {
        "title": "Debian Security Advisories: DSA-4792-1 openldap -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=f8947968aa4f0306f1365e97470d4150"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2022-1770",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2022-1770"
      },
      {
        "title": "Red Hat: Important: Red Hat OpenShift GitOps security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20221039 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: Red Hat OpenShift GitOps security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20221042 - Security Advisory"
      },
      {
        "title": "Red Hat: Moderate: Red Hat Advanced Cluster Management 2.2.11 security updates and bug fixes",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20220856 - Security Advisory"
      },
      {
        "title": "Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.5.4 security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20221396 - Security Advisory"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=ec6577109e640dac19a6ddb978afe82d"
      },
      {
        "title": "myapp-container-jaxrs",
        "trust": 0.1,
        "url": "https://github.com/akiraabe/myapp-container-jaxrs "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-25709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-617",
        "trust": 1.1
      },
      {
        "problemtype": "Reachable assertions (CWE-617) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-179714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25709"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25709"
      },
      {
        "trust": 1.7,
        "url": "https://security.netapp.com/advisory/ntap-20210716-0003/"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/kb/ht212147"
      },
      {
        "trust": 1.7,
        "url": "https://www.debian.org/security/2020/dsa-4792"
      },
      {
        "trust": 1.7,
        "url": "http://seclists.org/fulldisclosure/2021/feb/14"
      },
      {
        "trust": 1.7,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899675"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3cissues.bookkeeper.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3cissues.bookkeeper.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3cissues.bookkeeper.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3cissues.bookkeeper.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166309/red-hat-security-advisory-2022-0856-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-116-01"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022072111"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4301/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.1071"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0349/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4187/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166119/red-hat-security-advisory-2022-0621-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0779"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022032445"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.3348"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.4077/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.1263"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022022527"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/161245/apple-security-advisory-2021-02-01-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022022228"
      },
      {
        "trust": 0.6,
        "url": "https://support.apple.com/en-us/ht212147"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/160109/ubuntu-security-notice-usn-4634-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0196/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166789/red-hat-security-advisory-2022-1396-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/160180/ubuntu-security-notice-usn-4634-2.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022070813"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/openldap-assertion-error-via-certificate-list-syntax-33910"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166437/red-hat-security-advisory-2022-1039-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.1677"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25710"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-25710"
      },
      {
        "trust": 0.4,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.4,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-25709"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2022-24407"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22925"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-25315"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-19603"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-25236"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20838"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12762"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-25235"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-36085"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-23308"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16135"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-36084"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20231"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20232"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-28153"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3445"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-36086"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-23852"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-4122"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17594"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-22822"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-36087"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-22823"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-22827"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22898"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-42574"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5827"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19603"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-18218"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14155"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-13435"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-0920"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-31566"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-22826"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-33560"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23177"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-16135"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14155"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3999"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-17595"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13751"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3426"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3572"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-20232"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-20838"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-22925"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-17594"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-22876"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-23219"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-13750"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-22824"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-12762"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-45960"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13435"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-23218"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-28153"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18218"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-22825"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-23177"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-46143"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22876"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-22942"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-22898"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-0330"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3580"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3800"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-13751"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17595"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31566"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3200"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24370"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-20231"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-24370"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-5827"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13750"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3521"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-0920"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.2,
        "url": "https://usn.ubuntu.com/4634-1"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://security-tracker.debian.org/tracker/openldap"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0492"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21684"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-4154"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-41190"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0392"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0261"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-22817"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0413"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0847"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-44716"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:1396"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3577"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-36221"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0435"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0532"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2014-3577"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0516"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-22816"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21684"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0361"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0778"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0359"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0318"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-44717"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-0465"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23434"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27645"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0185"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-27645"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33574"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0466"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3564"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-35942"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-40346"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-0466"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23434"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3712"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-4155"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:0856"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/index"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-25214"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0465"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3752"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-4019"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-4192"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html-single/install/index#installing"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0155"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3984"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3573"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-4193"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25214"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3872"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-39241"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22825"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1025"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23219"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22823"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22826"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24407"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22824"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-45960"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-24731"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22822"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23218"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46143"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3999"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-25236"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24730"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22827"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23308"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-25315"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24731"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-25235"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-24730"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:1039"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-1025"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23852"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4634-2"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:0621"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/openldap/2.4.49+dfsg-2ubuntu1.5"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/openldap/2.4.45+dfsg-1ubuntu1.8"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/openldap/2.4.53+dfsg-1ubuntu1.2"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/openldap/2.4.42+dfsg-2ubuntu3.11"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-179714"
      },
      {
        "db": "PACKETSTORM",
        "id": "168945"
      },
      {
        "db": "PACKETSTORM",
        "id": "166789"
      },
      {
        "db": "PACKETSTORM",
        "id": "166309"
      },
      {
        "db": "PACKETSTORM",
        "id": "166437"
      },
      {
        "db": "PACKETSTORM",
        "id": "160180"
      },
      {
        "db": "PACKETSTORM",
        "id": "166119"
      },
      {
        "db": "PACKETSTORM",
        "id": "160109"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25709"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-179714"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-25709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168945"
      },
      {
        "db": "PACKETSTORM",
        "id": "166789"
      },
      {
        "db": "PACKETSTORM",
        "id": "166309"
      },
      {
        "db": "PACKETSTORM",
        "id": "166437"
      },
      {
        "db": "PACKETSTORM",
        "id": "160180"
      },
      {
        "db": "PACKETSTORM",
        "id": "166119"
      },
      {
        "db": "PACKETSTORM",
        "id": "160109"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25709"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-05-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-179714"
      },
      {
        "date": "2021-05-18T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-25709"
      },
      {
        "date": "2020-11-28T20:12:00",
        "db": "PACKETSTORM",
        "id": "168945"
      },
      {
        "date": "2022-04-20T15:12:33",
        "db": "PACKETSTORM",
        "id": "166789"
      },
      {
        "date": "2022-03-15T15:44:21",
        "db": "PACKETSTORM",
        "id": "166309"
      },
      {
        "date": "2022-03-24T14:40:17",
        "db": "PACKETSTORM",
        "id": "166437"
      },
      {
        "date": "2020-11-23T15:40:55",
        "db": "PACKETSTORM",
        "id": "160180"
      },
      {
        "date": "2022-02-23T13:46:00",
        "db": "PACKETSTORM",
        "id": "166119"
      },
      {
        "date": "2020-11-17T16:03:33",
        "db": "PACKETSTORM",
        "id": "160109"
      },
      {
        "date": "2020-11-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      },
      {
        "date": "2022-01-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      },
      {
        "date": "2021-05-18T12:15:07.673000",
        "db": "NVD",
        "id": "CVE-2020-25709"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-09-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-179714"
      },
      {
        "date": "2023-11-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-25709"
      },
      {
        "date": "2022-07-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      },
      {
        "date": "2022-01-26T09:04:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      },
      {
        "date": "2023-11-07T03:20:23.747000",
        "db": "NVD",
        "id": "CVE-2020-25709"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "168945"
      },
      {
        "db": "PACKETSTORM",
        "id": "160180"
      },
      {
        "db": "PACKETSTORM",
        "id": "160109"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "OpenLDAP\u00a0 Reachable assertion vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-016760"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202011-1517"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…