Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat directory server vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2010-2241
The (1) setup-ds.pl and (2) setup-ds-admin.pl setup scripts for Red Hat Directory Server 8 prior to 8.2 use world-readable permissions when creating cache files, which allows local users to obtain sensitive information including passwords for Directory and Administration Server a...
Redhat Directory Server 8.0
Redhat Directory Server 8.1
107
VMScore
CVE-2012-2678
389 Directory Server prior to 1.2.11.6 (aka Red Hat Directory Server prior to 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote malicious users to read the plaintext password via the unhashed#user#password attribute...
Redhat Directory Server 7.1
Redhat Directory Server
Redhat Directory Server 8.1
Redhat Directory Server 8.0
Fedoraproject 389 Directory Server 1.2.6
Fedoraproject 389 Directory Server 1.2.2
Fedoraproject 389 Directory Server 1.2.3
Fedoraproject 389 Directory Server 1.2.8
Fedoraproject 389 Directory Server 1.2.8.1
Fedoraproject 389 Directory Server 1.2.10.1
Fedoraproject 389 Directory Server 1.2.10.2
Fedoraproject 389 Directory Server 1.2.6.1
Fedoraproject 389 Directory Server 1.2.5
Fedoraproject 389 Directory Server 1.2.1
Fedoraproject 389 Directory Server 1.2.10
Fedoraproject 389 Directory Server
Fedoraproject 389 Directory Server 1.2.7
Fedoraproject 389 Directory Server 1.2.8.2
Fedoraproject 389 Directory Server 1.2.10.3
Fedoraproject 389 Directory Server 1.2.10.4
Fedoraproject 389 Directory Server 1.2.7.5
Fedoraproject 389 Directory Server 1.2.8.3
187
VMScore
CVE-2012-2746
389 Directory Server prior to 1.2.11.6 (aka Red Hat Directory Server prior to 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password.
Redhat Directory Server 7.1
Redhat Directory Server
Redhat Directory Server 8.1
Redhat Directory Server 8.0
Fedoraproject 389 Directory Server 1.2.7
Fedoraproject 389 Directory Server 1.2.6
Fedoraproject 389 Directory Server 1.2.3
Fedoraproject 389 Directory Server 1.2.5
Fedoraproject 389 Directory Server 1.2.8.1
Fedoraproject 389 Directory Server 1.2.8
Fedoraproject 389 Directory Server 1.2.10.2
Fedoraproject 389 Directory Server 1.2.10.3
Fedoraproject 389 Directory Server 1.2.2
Fedoraproject 389 Directory Server 1.2.10
Fedoraproject 389 Directory Server 1.2.10.1
Fedoraproject 389 Directory Server 1.2.7.5
Fedoraproject 389 Directory Server 1.2.8.2
Fedoraproject 389 Directory Server 1.2.8.3
Fedoraproject 389 Directory Server 1.2.10.4
Fedoraproject 389 Directory Server 1.2.10.7
Fedoraproject 389 Directory Server 1.2.6.1
Fedoraproject 389 Directory Server 1.2.1
445
VMScore
CVE-2020-35518
When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated malicious user to check the existence of an entry in the LDAP database.
Redhat 389 Directory Server
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Redhat Directory Server 11.0
552
VMScore
CVE-2011-0532
The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan hor...
Fedoraproject 389 Directory Server 1.2.6.1
Fedoraproject 389 Directory Server 1.2.6
Fedoraproject 389 Directory Server 1.2.5
Fedoraproject 389 Directory Server 1.2.2
Fedoraproject 389 Directory Server 1.2.8
Fedoraproject 389 Directory Server 1.2.7
Fedoraproject 389 Directory Server 1.2.7.5
Fedoraproject 389 Directory Server 1.2.1
Fedoraproject 389 Directory Server 1.2.3
Redhat Directory Server 8.2.3
Redhat Directory Server 8.2
418
VMScore
CVE-2011-0022
The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary pro...
Fedoraproject 389 Directory Server 1.2.6
Fedoraproject 389 Directory Server 1.2.5
Fedoraproject 389 Directory Server 1.2.1
Fedoraproject 389 Directory Server 1.2.8
Fedoraproject 389 Directory Server 1.2.3
Fedoraproject 389 Directory Server 1.2.7
Fedoraproject 389 Directory Server 1.2.7.5
Fedoraproject 389 Directory Server 1.2.6.1
Fedoraproject 389 Directory Server 1.2.2
Redhat Directory Server 8.2.3
Redhat Directory Server 8.2
409
VMScore
CVE-2008-0890
Red Hat Directory Server 7.1 before SP4 uses insecure permissions for certain directories, which allows local users to modify JAR files and execute arbitrary code via unknown vectors.
Redhat Directory Server
668
VMScore
CVE-2008-0893
Red Hat Administration Server, as used by Red Hat Directory Server 8.0 EL4 and EL5, does not properly restrict access to CGI scripts, which allows remote malicious users to perform administrative actions.
Redhat Directory Server 8.0
356
VMScore
CVE-2018-10935
A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.
Redhat 389 Directory Server
356
VMScore
CVE-2021-3514
When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.
Redhat 389 Directory Server -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »