Lucene search

K
RedhatDirectory Server8.1

5 matches found

CVE
CVE
added 2013/11/23 11:55 a.m.61 views

CVE-2013-4485

389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.

4CVSS6AI score0.00422EPSS
CVE
CVE
added 2013/07/31 1:20 p.m.58 views

CVE-2013-2219

The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server do not properly restrict access to entity attributes, which allows remote authenticated users to obtain sensitive information via a search query for the attribute.

4CVSS5.6AI score0.00173EPSS
CVE
CVE
added 2012/07/03 4:40 p.m.56 views

CVE-2012-2678

389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.

1.2CVSS6.6AI score0.00238EPSS
CVE
CVE
added 2012/07/03 4:40 p.m.47 views

CVE-2012-2746

389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password.

2.1CVSS6.2AI score0.00509EPSS
CVE
CVE
added 2010/08/17 8:0 p.m.44 views

CVE-2010-2241

The (1) setup-ds.pl and (2) setup-ds-admin.pl setup scripts for Red Hat Directory Server 8 before 8.2 use world-readable permissions when creating cache files, which allows local users to obtain sensitive information including passwords for Directory and Administration Server administrative account...

2.1CVSS6AI score0.00047EPSS