Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hxpc-5pf5-9xxg

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

EPSS

Процентиль: 59%
0.00378
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

redhat
почти 14 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

nvd
больше 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

debian
больше 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN ...

oracle-oval
почти 13 лет назад

ELSA-2013-0503: 389-ds-base security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 59%
0.00378
Низкий