Vulnerability Details CVE-2014-8088
The (1) Zend_Ldap class in Zend before 1.12.9 and (2) Zend\Ldap component in Zend 2.x before 2.2.8 and 2.3.x before 2.3.3 allows remote attackers to bypass authentication via a password starting with a null byte, which triggers an unauthenticated bind.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 65.9%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2014-8088
-
cpe:2.3:a:zend:zend_framework:1.0.0
-
cpe:2.3:a:zend:zend_framework:1.0.1
-
cpe:2.3:a:zend:zend_framework:1.0.2
-
cpe:2.3:a:zend:zend_framework:1.0.3
-
cpe:2.3:a:zend:zend_framework:1.0.4
-
cpe:2.3:a:zend:zend_framework:1.10.0
-
cpe:2.3:a:zend:zend_framework:1.10.1
-
cpe:2.3:a:zend:zend_framework:1.10.2
-
cpe:2.3:a:zend:zend_framework:1.10.3
-
cpe:2.3:a:zend:zend_framework:1.10.4
-
cpe:2.3:a:zend:zend_framework:1.10.5
-
cpe:2.3:a:zend:zend_framework:1.10.6
-
cpe:2.3:a:zend:zend_framework:1.10.7
-
cpe:2.3:a:zend:zend_framework:1.10.8
-
cpe:2.3:a:zend:zend_framework:1.10.9
-
cpe:2.3:a:zend:zend_framework:1.11.0
-
cpe:2.3:a:zend:zend_framework:1.11.1
-
cpe:2.3:a:zend:zend_framework:1.11.10
-
cpe:2.3:a:zend:zend_framework:1.11.11
-
cpe:2.3:a:zend:zend_framework:1.11.12
-
cpe:2.3:a:zend:zend_framework:1.11.13
-
cpe:2.3:a:zend:zend_framework:1.11.15
-
cpe:2.3:a:zend:zend_framework:1.11.2
-
cpe:2.3:a:zend:zend_framework:1.11.3
-
cpe:2.3:a:zend:zend_framework:1.11.4
-
cpe:2.3:a:zend:zend_framework:1.11.5
-
cpe:2.3:a:zend:zend_framework:1.11.6
-
cpe:2.3:a:zend:zend_framework:1.11.7
-
cpe:2.3:a:zend:zend_framework:1.11.8
-
cpe:2.3:a:zend:zend_framework:1.11.9
-
cpe:2.3:a:zend:zend_framework:1.12.0
-
cpe:2.3:a:zend:zend_framework:1.12.1
-
cpe:2.3:a:zend:zend_framework:1.12.2
-
cpe:2.3:a:zend:zend_framework:1.12.3
-
cpe:2.3:a:zend:zend_framework:1.12.4
-
cpe:2.3:a:zend:zend_framework:1.12.5
-
cpe:2.3:a:zend:zend_framework:1.12.6
-
cpe:2.3:a:zend:zend_framework:1.12.7
-
cpe:2.3:a:zend:zend_framework:1.5.0
-
cpe:2.3:a:zend:zend_framework:1.5.1
-
cpe:2.3:a:zend:zend_framework:1.5.2
-
cpe:2.3:a:zend:zend_framework:1.5.3
-
cpe:2.3:a:zend:zend_framework:1.6.0
-
cpe:2.3:a:zend:zend_framework:1.6.1
-
cpe:2.3:a:zend:zend_framework:1.6.2
-
cpe:2.3:a:zend:zend_framework:1.7.0
-
cpe:2.3:a:zend:zend_framework:1.7.1
-
cpe:2.3:a:zend:zend_framework:1.7.2
-
cpe:2.3:a:zend:zend_framework:1.7.3
-
cpe:2.3:a:zend:zend_framework:1.7.4
-
cpe:2.3:a:zend:zend_framework:1.7.5
-
cpe:2.3:a:zend:zend_framework:1.7.6
-
cpe:2.3:a:zend:zend_framework:1.7.7
-
cpe:2.3:a:zend:zend_framework:1.7.8
-
cpe:2.3:a:zend:zend_framework:1.7.9
-
cpe:2.3:a:zend:zend_framework:1.8.0
-
cpe:2.3:a:zend:zend_framework:1.8.1
-
cpe:2.3:a:zend:zend_framework:1.8.2
-
cpe:2.3:a:zend:zend_framework:1.8.3
-
cpe:2.3:a:zend:zend_framework:1.8.4
-
cpe:2.3:a:zend:zend_framework:1.8.5
-
cpe:2.3:a:zend:zend_framework:1.9.0
-
cpe:2.3:a:zend:zend_framework:1.9.1
-
cpe:2.3:a:zend:zend_framework:1.9.2
-
cpe:2.3:a:zend:zend_framework:1.9.3
-
cpe:2.3:a:zend:zend_framework:1.9.4
-
cpe:2.3:a:zend:zend_framework:1.9.5
-
cpe:2.3:a:zend:zend_framework:1.9.6
-
cpe:2.3:a:zend:zend_framework:1.9.7
-
cpe:2.3:a:zend:zend_framework:1.9.8
-
cpe:2.3:a:zend:zend_framework:2.0.0
-
cpe:2.3:a:zend:zend_framework:2.01
-
cpe:2.3:a:zend:zend_framework:2.2.2
-
cpe:2.3:a:zend:zend_framework:2.2.3
-
cpe:2.3:a:zend:zend_framework:2.2.4
-
cpe:2.3:a:zend:zend_framework:2.2.5
-
cpe:2.3:a:zend:zend_framework:2.2.6
-
cpe:2.3:a:zend:zend_framework:2.2.7
-
cpe:2.3:a:zend:zend_framework:2.3.0
-
cpe:2.3:a:zend:zend_framework:2.3.1
-
cpe:2.3:a:zend:zend_framework:2.3.2