Show filters
49 Total Results
Displaying 31-40 of 49
Sort by:
Attacker Value
Unknown
CVE-2012-2746
Disclosure Date: July 03, 2012 (last updated October 04, 2023)
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password.
0
Attacker Value
Unknown
CVE-2012-2678
Disclosure Date: July 03, 2012 (last updated October 04, 2023)
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.
0
Attacker Value
Unknown
CVE-2011-0019
Disclosure Date: February 23, 2011 (last updated October 04, 2023)
slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests.
0
Attacker Value
Unknown
CVE-2011-0022
Disclosure Date: February 23, 2011 (last updated October 04, 2023)
The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory.
0
Attacker Value
Unknown
CVE-2011-0532
Disclosure Date: February 23, 2011 (last updated October 04, 2023)
The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
0
Attacker Value
Unknown
CVE-2010-2241
Disclosure Date: August 17, 2010 (last updated October 04, 2023)
The (1) setup-ds.pl and (2) setup-ds-admin.pl setup scripts for Red Hat Directory Server 8 before 8.2 use world-readable permissions when creating cache files, which allows local users to obtain sensitive information including passwords for Directory and Administration Server administrative accounts.
0
Attacker Value
Unknown
CVE-2008-3283
Disclosure Date: August 29, 2008 (last updated October 04, 2023)
Multiple memory leaks in Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 and earlier allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) the authentication / bind phase and (2) anonymous LDAP search requests.
0
Attacker Value
Unknown
CVE-2008-2929
Disclosure Date: August 29, 2008 (last updated October 04, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping.
0
Attacker Value
Unknown
CVE-2008-2930
Disclosure Date: August 29, 2008 (last updated October 04, 2023)
Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 allow remote attackers to cause a denial of service (CPU consumption and search outage) via crafted LDAP search requests with patterns, related to a single-threaded regular-expression subsystem.
0
Attacker Value
Unknown
CVE-2008-1677
Disclosure Date: May 12, 2008 (last updated October 04, 2023)
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
0