Filter
-Infinity
0

redhat/389-ds-baseModerate: redhat-ds:11 security and bug fix update

First published (updated )

redhat/389-ds-baseModerate: redhat-ds:11 security and bug fix update

First published (updated )

redhat/389-ds-baseModerate: redhat-ds:12 security and bug fix update

First published (updated )

redhat/389-ds-baseImportant: redhat-ds:11 security and bug fix update

First published (updated )

redhat/389-ds-baseImportant: redhat-ds:11 security update

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/389-ds-baseImportant: redhat-ds:12 security, bug fix update

First published (updated )

Red Hat Directory Server389-ds-base: unauthenticated user can trigger a dos by sending a specific extended search request

EPSS
0.07%
First published (updated )

redhat/389-ds-baseModerate: redhat-ds:11 security, bug fix, and enhancement update

First published (updated )

Red Hat Directory Server389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)

First published (updated )

redhat/389-ds-baseModerate: redhat-ds:11 security, bug fix, and enhancement update

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Red Hat Enterprise LinuxNull Pointer Dereference

First published (updated )

FedoraAn access control bypass vulnerability found in 389-ds-base. That mishandling of the filter that wou…

7.5
First published (updated )

FedoraA vulnerability was found in the 389 Directory Server that allows expired passwords to access the da…

First published (updated )

Red Hat 389 Directory ServerA vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker w…

7.5
First published (updated )

redhat/389-ds-baseDouble Free

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/389-ds-baseA flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally …

First published (updated )

redhat/389-ds-baseNull Pointer Dereference

First published (updated )

redhat/389-ds-baseInfoleak

First published (updated )

Red Hat 389 Directory ServerA flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to …

First published (updated )

Red Hat 389 Directory ServerIt was found that the fix for CVE-2018-14648 in 389-ds-base, versions 1.4.0.x before 1.4.0.17, was i…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/389-ds-baseIn 389-ds-base, requests are handled by workers threads. Each sockets will be waited by the worker f…

7.5
First published (updated )

redhat/389-ds-baseInfoleak

First published (updated )

redhat/389-ds-baseA flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive C…

7.8
First published (updated )

Red Hat Enterprise Linux ServerDouble Free

7.5
First published (updated )

Red Hat Enterprise Linux ServerInput Validation

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/389-ds-baseInput Validation

First published (updated )

redhat/389-ds-baseBy default, when the Replica and/or retroChangeLog plugins are enabled, 389-ds-base stores password …

7.2
First published (updated )

Red Hat Enterprise Linux ServerRace Condition

7.1
First published (updated )

Red Hat 389 Directory Server389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniquen…

7.5
First published (updated )

Red Hat 389 Directory ServerBuffer Overflow

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203