Логотип exploitDog
bind:"CVE-2019-3883" OR bind:"CVE-2019-14824" OR bind:"CVE-2019-10224" OR bind:"CVE-2018-10871"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-3883" OR bind:"CVE-2019-14824" OR bind:"CVE-2019-10224" OR bind:"CVE-2018-10871"

Количество 25

Количество 25

redhat логотип

CVE-2018-10871

больше 7 лет назад

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

CVSS3: 3.8
EPSS: Низкий
nvd логотип

CVE-2018-10871

больше 7 лет назад

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

CVSS3: 3.8
EPSS: Низкий
debian логотип

CVE-2018-10871

больше 7 лет назад

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Clear ...

CVSS3: 3.8
EPSS: Низкий
github логотип

GHSA-349x-pch6-942w

больше 3 лет назад

A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.

CVSS3: 4.6
EPSS: Низкий
github логотип

GHSA-pxxp-9p24-326h

больше 3 лет назад

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2018-10871

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

CVSS3: 3.8
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-10871

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

CVSS3: 3.8
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-10871

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Clear ...

CVSS3: 3.8
0%
Низкий
больше 7 лет назад
github логотип
GHSA-349x-pch6-942w

A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.

CVSS3: 4.6
0%
Низкий
больше 3 лет назад
github логотип
GHSA-pxxp-9p24-326h

389-ds-base before versions 1.3.8.5, 1.4.0.12 is vulnerable to a Cleartext Storage of Sensitive Information. By default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores passwords in plaintext format in their respective changelog files. An attacker with sufficiently high privileges, such as root or Directory Manager, can query these files in order to retrieve plaintext passwords.

CVSS3: 7.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу