Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hxpc-5pf5-9xxg

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

EPSS

Процентиль: 59%
0.00378
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

redhat
больше 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

nvd
почти 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN entry is moved by a modrdn operation, which allows remote authenticated users with certain permissions to bypass ACL restrictions and access the DN entry.

debian
почти 13 лет назад

389 Directory Server 1.2.10 does not properly update the ACL when a DN ...

oracle-oval
больше 12 лет назад

ELSA-2013-0503: 389-ds-base security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 59%
0.00378
Низкий