Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jpqj-372q-hwmp

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

EPSS

Процентиль: 50%
0.00266
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 10 лет назад

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

redhat
больше 10 лет назад

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

nvd
больше 10 лет назад

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

debian
больше 10 лет назад

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x bef ...

oracle-oval
больше 10 лет назад

ELSA-2015-0416: 389-ds-base security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 50%
0.00266
Низкий

Дефекты

CWE-200