5
CVE-2014-3562
- EPSS 0.31%
- Published 21.08.2014 14:55:04
- Last modified 12.04.2025 10:46:40
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
Data is provided by the National Vulnerability Database (NVD)
Fedoraproject ≫ 389 Directory Server Version1.2.1
Fedoraproject ≫ 389 Directory Server Version1.2.2
Fedoraproject ≫ 389 Directory Server Version1.2.3
Fedoraproject ≫ 389 Directory Server Version1.2.5
Fedoraproject ≫ 389 Directory Server Version1.2.5 Updaterc1
Fedoraproject ≫ 389 Directory Server Version1.2.5 Updaterc2
Fedoraproject ≫ 389 Directory Server Version1.2.5 Updaterc3
Fedoraproject ≫ 389 Directory Server Version1.2.5 Updaterc4
Fedoraproject ≫ 389 Directory Server Version1.2.6
Fedoraproject ≫ 389 Directory Server Version1.2.6 Updatea2
Fedoraproject ≫ 389 Directory Server Version1.2.6 Updatea3
Fedoraproject ≫ 389 Directory Server Version1.2.6 Updatea4
Fedoraproject ≫ 389 Directory Server Version1.2.6 Updaterc1
Fedoraproject ≫ 389 Directory Server Version1.2.6 Updaterc2
Fedoraproject ≫ 389 Directory Server Version1.2.6 Updaterc3
Fedoraproject ≫ 389 Directory Server Version1.2.6 Updaterc6
Fedoraproject ≫ 389 Directory Server Version1.2.6 Updaterc7
Fedoraproject ≫ 389 Directory Server Version1.2.6.1
Fedoraproject ≫ 389 Directory Server Version1.2.7 Updatealpha3
Fedoraproject ≫ 389 Directory Server Version1.2.7.5
Fedoraproject ≫ 389 Directory Server Version1.2.8 Updatealpha1
Fedoraproject ≫ 389 Directory Server Version1.2.8 Updatealpha2
Fedoraproject ≫ 389 Directory Server Version1.2.8 Updatealpha3
Fedoraproject ≫ 389 Directory Server Version1.2.8 Updaterc1
Fedoraproject ≫ 389 Directory Server Version1.2.8 Updaterc2
Fedoraproject ≫ 389 Directory Server Version1.2.8.1
Fedoraproject ≫ 389 Directory Server Version1.2.8.2
Fedoraproject ≫ 389 Directory Server Version1.2.8.3
Fedoraproject ≫ 389 Directory Server Version1.2.9.9
Fedoraproject ≫ 389 Directory Server Version1.2.10
Fedoraproject ≫ 389 Directory Server Version1.2.10 Updatealpha8
Fedoraproject ≫ 389 Directory Server Version1.2.10 Updaterc1
Fedoraproject ≫ 389 Directory Server Version1.2.10.2
Fedoraproject ≫ 389 Directory Server Version1.2.10.3
Fedoraproject ≫ 389 Directory Server Version1.2.10.4
Fedoraproject ≫ 389 Directory Server Version1.2.10.11
Fedoraproject ≫ 389 Directory Server Version1.2.11.1
Fedoraproject ≫ 389 Directory Server Version1.2.11.5
Fedoraproject ≫ 389 Directory Server Version1.2.11.6
Fedoraproject ≫ 389 Directory Server Version1.2.11.8
Fedoraproject ≫ 389 Directory Server Version1.2.11.9
Fedoraproject ≫ 389 Directory Server Version1.2.11.10
Fedoraproject ≫ 389 Directory Server Version1.2.11.11
Fedoraproject ≫ 389 Directory Server Version1.2.11.12
Fedoraproject ≫ 389 Directory Server Version1.2.11.13
Fedoraproject ≫ 389 Directory Server Version1.2.11.14
Fedoraproject ≫ 389 Directory Server Version1.2.11.15
Fedoraproject ≫ 389 Directory Server Version1.2.11.17
Fedoraproject ≫ 389 Directory Server Version1.2.11.19
Fedoraproject ≫ 389 Directory Server Version1.2.11.20
Fedoraproject ≫ 389 Directory Server Version1.2.11.21
Fedoraproject ≫ 389 Directory Server Version1.2.11.22
Fedoraproject ≫ 389 Directory Server Version1.2.11.23
Fedoraproject ≫ 389 Directory Server Version1.2.11.25
Fedoraproject ≫ 389 Directory Server Version1.2.11.26
Fedoraproject ≫ 389 Directory Server Version1.3.0.2
Fedoraproject ≫ 389 Directory Server Version1.3.0.3
Fedoraproject ≫ 389 Directory Server Version1.3.0.4
Fedoraproject ≫ 389 Directory Server Version1.3.0.5
Fedoraproject ≫ 389 Directory Server Version1.3.0.6
Fedoraproject ≫ 389 Directory Server Version1.3.0.7
Fedoraproject ≫ 389 Directory Server Version1.3.0.8
Redhat ≫ Directory Server Version8.0
Redhat ≫ Enterprise Linux Version6.0
Redhat ≫ Enterprise Linux Version7.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.31% | 0.508 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.