- EPSS 0.31%
- Published 21.08.2014 14:55:04
- Last modified 12.04.2025 10:46:40
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
- EPSS 0.42%
- Published 23.11.2013 11:55:04
- Last modified 11.04.2025 00:51:21
389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.
- EPSS 0.17%
- Published 31.07.2013 13:20:25
- Last modified 11.04.2025 00:51:21
The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server do not properly restrict access to entity attributes, which allows remote authenticated users to obtain sensitive information via a search query for the attribute.
CVE-2012-2746
- EPSS 0.51%
- Published 03.07.2012 16:40:34
- Last modified 11.04.2025 00:51:21
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated us...
CVE-2012-2678
- EPSS 0.24%
- Published 03.07.2012 16:40:33
- Last modified 11.04.2025 00:51:21
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#use...
CVE-2011-0532
- EPSS 0.05%
- Published 23.02.2011 19:00:01
- Last modified 11.04.2025 00:51:21
The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to ga...
CVE-2011-0022
- EPSS 0.04%
- Published 23.02.2011 19:00:01
- Last modified 11.04.2025 00:51:21
The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (...
CVE-2011-0019
- EPSS 0.73%
- Published 23.02.2011 19:00:01
- Last modified 11.04.2025 00:51:21
slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unsp...
CVE-2010-2241
- EPSS 0.05%
- Published 17.08.2010 20:00:03
- Last modified 11.04.2025 00:51:21
The (1) setup-ds.pl and (2) setup-ds-admin.pl setup scripts for Red Hat Directory Server 8 before 8.2 use world-readable permissions when creating cache files, which allows local users to obtain sensitive information including passwords for Directory...
CVE-2008-3283
- EPSS 7.32%
- Published 29.08.2008 18:41:00
- Last modified 09.04.2025 00:30:58
Multiple memory leaks in Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) the authent...