Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

openldap

About This Vendor

openldap is a technology vendor producing software and infrastructure products. As a software provider, openldap's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of openldap's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 61 known vulnerabilities from openldap. This includes 2 critical-severity issues and 28 high-severity issues that represent significant risk. These vulnerabilities affect 60 distinct products across openldap's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2000 through 2023, indicating decades of continuous security attention and research. Organizations deploying openldap products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2000-0336 2000-04-21 2025-04-03 - 2.1 Unknown
CVE-2000-0748 2000-10-20 2025-04-03 - 4.6 Unknown
CVE-2001-0977 2001-07-16 2025-04-03 - 5.0 Likely
CVE-2002-0045 2002-01-31 2025-04-03 - 7.5 Likely
CVE-2002-1378 2003-01-02 2025-04-03 - 7.5 Likely
CVE-2002-1379 2003-01-02 2025-04-03 - 7.5 Likely
CVE-2002-1508 2003-02-19 2025-04-03 - 1.2 Unknown
CVE-2003-1201 2003-03-20 2025-04-03 - 5.0 Likely
CVE-2004-0823 2004-09-07 2025-04-03 - 7.5 Likely
CVE-2004-1880 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2005-2069 2005-06-30 2025-04-03 - 5.0 Likely
CVE-2005-4442 2005-12-21 2025-04-03 - 7.2 Unknown
CVE-2006-2754 2006-06-01 2025-04-03 - 5.0 Likely
CVE-2006-4600 2006-09-07 2025-04-03 - 2.3 Unknown
CVE-2006-5779 2006-11-07 2025-04-09 7.5 5.0 Likely
CVE-2006-6493 2006-12-13 2025-04-09 - 5.1 Unknown
CVE-2007-5707 2007-10-30 2025-04-09 - 7.1 Likely
CVE-2007-5708 2007-10-30 2025-04-09 - 7.1 Likely
CVE-2007-6698 2008-02-01 2025-04-09 - 4.0 Likely
CVE-2008-0658 2008-02-13 2025-04-09 - 4.0 Likely
CVE-2008-2952 2008-07-01 2025-04-09 - 5.0 Likely
CVE-2009-3767 2009-10-23 2025-04-09 - 4.3 Likely
CVE-2010-0211 2010-07-28 2025-04-11 9.8 5.0 Likely
CVE-2010-0212 2010-07-28 2025-04-11 - 5.0 Likely
CVE-2011-1024 2011-03-20 2025-04-11 - 4.6 Unknown
CVE-2011-1025 2011-03-20 2025-04-11 - 6.8 Likely
CVE-2011-1081 2011-03-20 2025-04-11 - 5.0 Likely
CVE-2011-4079 2011-10-27 2025-04-11 - 4.0 Likely
CVE-2012-2668 2012-06-17 2025-04-11 - 4.3 Likely
CVE-2012-1164 2012-06-29 2025-04-11 - 2.6 Unknown
CVE-2013-4449 2014-02-05 2025-04-11 - 4.3 Likely
CVE-2015-1545 2015-02-12 2025-04-12 - 5.0 Likely
CVE-2015-1546 2015-02-12 2025-04-12 - 5.0 Likely
CVE-2014-9713 2015-04-01 2025-04-12 - 4.0 Likely
CVE-2015-6908 2015-09-11 2025-04-12 - 5.0 Likely
CVE-2015-3276 2015-12-07 2025-04-12 7.5 5.0 Likely
CVE-2017-9287 2017-05-29 2025-04-20 6.5 4.0 Likely
CVE-2016-4984 2017-07-17 2025-04-20 4.7 1.9 Unknown
CVE-2017-14159 2017-09-05 2025-04-20 4.7 1.9 Unknown
CVE-2017-17740 2017-12-18 2025-04-20 7.5 5.0 Likely
CVE-2019-13057 2019-07-26 2024-11-21 4.9 3.5 Unknown
CVE-2019-13565 2019-07-26 2024-11-21 7.5 5.0 Likely
CVE-2014-8182 2020-01-02 2024-11-21 7.5 4.3 Likely
CVE-2020-12243 2020-04-28 2024-11-21 7.5 5.0 Likely
CVE-2020-15719 2020-07-14 2024-11-21 4.2 4.0 Unknown
CVE-2020-25692 2020-12-08 2024-11-21 7.5 5.0 Likely
CVE-2020-36221 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2020-36222 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2020-36223 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2020-36224 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2020-36225 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2020-36226 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2020-36227 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2020-36228 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2020-36229 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2020-36230 2021-01-26 2024-11-21 7.5 5.0 Likely
CVE-2021-27212 2021-02-14 2024-11-21 7.5 5.0 Likely
CVE-2020-25709 2021-05-18 2024-11-21 7.5 5.0 Likely
CVE-2020-25710 2021-05-28 2024-11-21 7.5 5.0 Likely
CVE-2022-29155 2022-05-04 2024-11-21 9.8 7.5 Likely
CVE-2023-2953 2023-05-30 2025-01-10 7.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for openldap by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with openldap's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.