Show filters
48 Total Results
Displaying 31-40 of 48
Sort by:
Attacker Value
Unknown

CVE-2014-8112

Disclosure Date: March 10, 2015 (last updated October 05, 2023)
389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.
0
Attacker Value
Unknown

CVE-2014-8105

Disclosure Date: March 10, 2015 (last updated October 05, 2023)
389 Directory Server before 1.3.2.27 and 1.3.3.x before 1.3.3.9 does not properly restrict access to the "cn=changelog" LDAP sub-tree, which allows remote attackers to obtain sensitive information from the changelog via unspecified vectors.
0
Attacker Value
Unknown

CVE-2014-3562

Disclosure Date: August 21, 2014 (last updated October 05, 2023)
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
0
Attacker Value
Unknown

CVE-2014-0132

Disclosure Date: March 18, 2014 (last updated October 05, 2023)
The SASL authentication functionality in 389 Directory Server before 1.2.11.26 allows remote authenticated users to connect as an arbitrary user and gain privileges via the authzid parameter in a SASL/GSSAPI bind.
0
Attacker Value
Unknown

CVE-2013-4485

Disclosure Date: November 23, 2013 (last updated October 05, 2023)
389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.
0
Attacker Value
Unknown

CVE-2013-4283

Disclosure Date: September 10, 2013 (last updated October 05, 2023)
ns-slapd in 389 Directory Server before 1.3.0.8 allows remote attackers to cause a denial of service (server crash) via a crafted Distinguished Name (DN) in a MOD operation request.
0
Attacker Value
Unknown

CVE-2013-2219

Disclosure Date: July 31, 2013 (last updated October 05, 2023)
The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server do not properly restrict access to entity attributes, which allows remote authenticated users to obtain sensitive information via a search query for the attribute.
0
Attacker Value
Unknown

CVE-2013-1897

Disclosure Date: May 13, 2013 (last updated October 05, 2023)
The do_search function in ldap/servers/slapd/search.c in 389 Directory Server 1.2.x before 1.2.11.20 and 1.3.x before 1.3.0.5 does not properly restrict access to entries when the nsslapd-allow-anonymous-access configuration is set to rootdse and the BASE search scope is used, which allows remote attackers to obtain sensitive information outside of the rootDSE via a crafted LDAP search.
0
Attacker Value
Unknown

CVE-2013-0312

Disclosure Date: March 13, 2013 (last updated October 05, 2023)
389 Directory Server before 1.3.0.4 allows remote attackers to cause a denial of service (crash) via a zero length LDAP control sequence.
0
Attacker Value
Unknown

CVE-2012-4450

Disclosure Date: October 01, 2012 (last updated October 05, 2023)
389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.
0