Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-2678

Опубликовано: 03 июл. 2012
Источник: debian
EPSS Низкий

Описание

389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
389-ds-basenot-affectedpackage

EPSS

Процентиль: 47%
0.00238
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.

redhat
больше 13 лет назад

389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.

nvd
больше 13 лет назад

389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.

github
больше 3 лет назад

389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.

oracle-oval
больше 13 лет назад

ELSA-2012-0997: 389-ds-base security update (MODERATE)

EPSS

Процентиль: 47%
0.00238
Низкий