Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jpqj-372q-hwmp

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

EPSS

Процентиль: 54%
0.0031
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
почти 11 лет назад

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

redhat
почти 11 лет назад

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

nvd
почти 11 лет назад

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.

debian
почти 11 лет назад

389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x bef ...

oracle-oval
почти 11 лет назад

ELSA-2015-0416: 389-ds-base security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 54%
0.0031
Низкий

Дефекты

CWE-200