Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1067513?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "389-ds-base", "version": "3.1.2+vendor1-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "3.1.2+vendor1-2", "latest_non_vulnerable_version": "3.1.2+vendor1-2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83716?format=api", "vulnerability_id": "VCID-1cnv-xra9-d7fw", "summary": "389-ds-base: Remote DoS via search filters in slapi_filter_sprintf in slapd/util.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15134.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15134.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15134", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90361", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.9038", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90408", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90417", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90415", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15134" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531573", "reference_id": "1531573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531573" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888452", "reference_id": "888452", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0163", "reference_id": "RHSA-2018:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0163" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586251?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.7.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.7.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-15134" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1cnv-xra9-d7fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83486?format=api", "vulnerability_id": "VCID-1emx-jre5-v7dm", "summary": "389-ds-base: ns-slapd crash via large filter value in ldapsearch", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1089.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1089.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1089", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94428", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94489", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94481", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94485", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94448", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94462", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94465", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14569", "scoring_system": "epss", "scoring_elements": "0.94467", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1089" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1089", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1089" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html" }, { "reference_url": "http://www.securityfocus.com/bid/104137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104137" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559802", "reference_id": "1559802", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559802" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898138", "reference_id": "898138", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898138" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1089", "reference_id": "CVE-2018-1089", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1089" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1364", "reference_id": "RHSA-2018:1364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1380", "reference_id": "RHSA-2018:1380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1380" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582454?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.8.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.8.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-1089" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1emx-jre5-v7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85372?format=api", "vulnerability_id": "VCID-34te-4xhe-17h2", "summary": "389-ds-base: worker threads do not detect abnormally closed connections causing DoS", "references": [ { "reference_url": "http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-4-7.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-4-7.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0204.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0204.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0741.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88466", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88468", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.8841", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88418", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88427", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.8843", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88465", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88458", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88457", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0402", "scoring_system": "epss", "scoring_elements": "0.88471", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0741" }, { "reference_url": "https://fedorahosted.org/389/changeset/cd45d032421b0ecf76d8cbb9b1c3aeef7680d9a2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://fedorahosted.org/389/changeset/cd45d032421b0ecf76d8cbb9b1c3aeef7680d9a2/" }, { "reference_url": "https://fedorahosted.org/389/ticket/48412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://fedorahosted.org/389/ticket/48412" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "reference_url": "http://www.securityfocus.com/bid/82343", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/82343" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299416", "reference_id": "1299416", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299416" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0741", "reference_id": "CVE-2016-0741", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0204", "reference_id": "RHSA-2016:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0204" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585322?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.4.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.4.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-0741" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-34te-4xhe-17h2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82979?format=api", "vulnerability_id": "VCID-3paj-fqdp-yyg3", "summary": "389-ds-base: using dscreate in verbose mode results in information disclosure", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10224.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10224.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10224", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16239", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16368", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16304", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16242", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16263", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1642", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16483", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1628", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16365", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16423", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16407", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10224" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10224" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10224" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" }, { "reference_url": "https://pagure.io/389-ds-base/issue/50251", "reference_id": "", "reference_type": "", "scores": [], "url": "https://pagure.io/389-ds-base/issue/50251" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677147", "reference_id": "1677147", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677147" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10224", "reference_id": "CVE-2019-10224", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10224" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3401", "reference_id": "RHSA-2019:3401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3401" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583820?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.1.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.1.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-10224" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3paj-fqdp-yyg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86351?format=api", "vulnerability_id": "VCID-3x4e-w658-z7as", "summary": "389-ds: flaw in parsing authzid can lead to privilege escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0132.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68614", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68632", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68651", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68628", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68697", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68721", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68707", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68678", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.6872", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68731", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68709", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0132" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074845", "reference_id": "1074845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074845" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741600", "reference_id": "741600", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0292", "reference_id": "RHSA-2014:0292", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0292" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585906?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.2.9-1.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.2.9-1.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-0132" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3x4e-w658-z7as" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75506?format=api", "vulnerability_id": "VCID-4tdy-umt6-4ubr", "summary": "389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2199.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2199.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2199", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25485", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26978", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26952", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27125", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27021", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27067", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27025", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26969", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2199" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072531", "reference_id": "1072531", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072531" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267976", "reference_id": "2267976", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267976" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.8::el8", "reference_id": "cpe:/a:redhat:directory_server:11.8::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.8::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.9::el8", "reference_id": "cpe:/a:redhat:directory_server:11.9::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.9::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9", "reference_id": "cpe:/a:redhat:directory_server:12.4::el9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8", "reference_id": "cpe:/a:redhat:directory_server_e4s:11.5::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client", "reference_id": "cpe:/o:redhat:enterprise_linux:7::client", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode", "reference_id": "cpe:/o:redhat:enterprise_linux:7::computenode", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server", "reference_id": "cpe:/o:redhat:enterprise_linux:7::server", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation", "reference_id": "cpe:/o:redhat:enterprise_linux:7::workstation", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-2199", "reference_id": "CVE-2024-2199", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-2199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3591", "reference_id": "RHSA-2024:3591", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:3591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3837", "reference_id": "RHSA-2024:3837", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:3837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4092", "reference_id": "RHSA-2024:4092", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4209", "reference_id": "RHSA-2024:4209", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4210", "reference_id": "RHSA-2024:4210", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4210" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4235", "reference_id": "RHSA-2024:4235", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4633", "reference_id": "RHSA-2024:4633", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4633" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5690", "reference_id": "RHSA-2024:5690", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:5690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1632", "reference_id": "RHSA-2025:1632", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-28T15:52:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:1632" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582292?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583535?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.1%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.1%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-2199" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4tdy-umt6-4ubr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80468?format=api", "vulnerability_id": "VCID-4tn2-her5-6fe1", "summary": "389-ds-base: sync_repl NULL pointer dereference in sync_create_state_control()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3514.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3514.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3514", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56951", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56977", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56974", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56932", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56954", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.5693", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56984", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56972", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56948", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3514" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952907", "reference_id": "1952907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952907" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988727", "reference_id": "988727", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988727" }, { "reference_url": "https://security.archlinux.org/ASA-202107-72", "reference_id": "ASA-202107-72", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-72" }, { "reference_url": "https://security.archlinux.org/AVG-2206", "reference_id": "AVG-2206", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2595", "reference_id": "RHSA-2021:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2796", "reference_id": "RHSA-2021:2796", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2796" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3955", "reference_id": "RHSA-2021:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0952", "reference_id": "RHSA-2022:0952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0952" }, { "reference_url": "https://usn.ubuntu.com/USN-5231-1/", "reference_id": "USN-USN-5231-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5231-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-3514" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4tn2-her5-6fe1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79388?format=api", "vulnerability_id": "VCID-63rm-mq1r-5fbz", "summary": "389-ds-base: access control bypass by query (filter in LDAP terms) optimiser", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1949.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1949.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1949", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69098", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69109", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69118", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71435", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71468", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.7148", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71502", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71486", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71427", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71453", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1949" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1949" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016446", "reference_id": "1016446", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016446" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091781", "reference_id": "2091781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091781" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582866?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-1949" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63rm-mq1r-5fbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87056?format=api", "vulnerability_id": "VCID-676b-82um-duhh", "summary": "rhds/389: plaintext password disclosure flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2678.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2678.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2678", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46812", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46866", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46889", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46862", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46925", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46921", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4687", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2678" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829933", "reference_id": "829933", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0997", "reference_id": "RHSA-2012:0997", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1041", "reference_id": "RHSA-2012:1041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1041" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584542?format=api", "purl": "pkg:deb/debian/389-ds-base@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-2678" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-676b-82um-duhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82470?format=api", "vulnerability_id": "VCID-6cvm-779c-dkgk", "summary": "389-ds-base: Insufficient fix for CVE-2018-14648 denial of service in RHEL-7.5", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10171.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10171.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10171", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48145", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48182", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48154", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48201", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48225", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48199", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58736", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58768", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58773", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00368", "scoring_system": "epss", "scoring_elements": "0.58751", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10171" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722081", "reference_id": "1722081", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722081" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1789", "reference_id": "RHSA-2019:1789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1789" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584542?format=api", "purl": "pkg:deb/debian/389-ds-base@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-10171" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6cvm-779c-dkgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74971?format=api", "vulnerability_id": "VCID-6f2q-qatg-kucr", "summary": "389-ds-base: unauthenticated user can trigger a DoS by sending a specific extended search request", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6237.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6237.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6237", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74334", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74319", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74364", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74327", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74335", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74355", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77707", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77713", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6237" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6237" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293579", "reference_id": "2293579", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293579" }, { "reference_url": "https://github.com/389ds/389-ds-base/issues/5989", "reference_id": "5989", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/" } ], "url": "https://github.com/389ds/389-ds-base/issues/5989" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11", "reference_id": "cpe:/a:redhat:directory_server:11", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9", "reference_id": "cpe:/a:redhat:directory_server:12.4::el9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-6237", "reference_id": "CVE-2024-6237", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-6237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4997", "reference_id": "RHSA-2024:4997", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5192", "reference_id": "RHSA-2024:5192", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:5192" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/921465?format=api", "purl": "pkg:deb/debian/389-ds-base@2.4.5%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.4.5%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-6237" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6f2q-qatg-kucr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79580?format=api", "vulnerability_id": "VCID-77rw-db6h-hya9", "summary": "389-ds-base: sending crafted message could result in DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0918.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0918.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0918", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08412", "scoring_system": "epss", "scoring_elements": "0.92295", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08412", "scoring_system": "epss", "scoring_elements": "0.92302", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08412", "scoring_system": "epss", "scoring_elements": "0.92308", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08412", "scoring_system": "epss", "scoring_elements": "0.92311", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08412", "scoring_system": "epss", "scoring_elements": "0.92322", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08412", "scoring_system": "epss", "scoring_elements": "0.92332", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08412", "scoring_system": "epss", "scoring_elements": "0.92334", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08412", "scoring_system": "epss", "scoring_elements": "0.92333", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08412", "scoring_system": "epss", "scoring_elements": "0.92327", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08793", "scoring_system": "epss", "scoring_elements": "0.92537", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0946", "scoring_system": "epss", "scoring_elements": "0.92824", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016445", "reference_id": "1016445", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016445" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055815", "reference_id": "2055815", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055815" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2210", "reference_id": "RHSA-2022:2210", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2210" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5239", "reference_id": "RHSA-2022:5239", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5239" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5620", "reference_id": "RHSA-2022:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5823", "reference_id": "RHSA-2022:5823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8162", "reference_id": "RHSA-2022:8162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8976", "reference_id": "RHSA-2022:8976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8976" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582292?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582293?format=api", "purl": "pkg:deb/debian/389-ds-base@2.0.15-1.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.0.15-1.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-0918" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-77rw-db6h-hya9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83183?format=api", "vulnerability_id": "VCID-7teh-3vk4-a7du", "summary": "389-ds-base: Server crash through modify command with large DN", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14624.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.80922", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.80931", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.80954", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.80951", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.80978", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.80986", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.81002", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.80988", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.8098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.81017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.81019", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01478", "scoring_system": "epss", "scoring_elements": "0.81018", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14624" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619450", "reference_id": "1619450", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619450" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907778", "reference_id": "907778", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2757", "reference_id": "RHSA-2018:2757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2757" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585308?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.0.18-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.0.18-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-14624" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7teh-3vk4-a7du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78632?format=api", "vulnerability_id": "VCID-bpw5-xeju-93f3", "summary": "RHDS: LDAP browser tries to decode userPassword instead of userCertificate attribute", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1055.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1055.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1055", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19886", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19695", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1968", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19682", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19943", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1975", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19801", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19806", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19761", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19704", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1055" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034891", "reference_id": "1034891", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034891" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173517", "reference_id": "2173517", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173517" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/", "reference_id": "MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T14:02:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3489", "reference_id": "RHSA-2023:3489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4655", "reference_id": "RHSA-2023:4655", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4655" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0", "reference_id": "show_bug.cgi?id=2173517#c0", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T14:02:37Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/921464?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.4%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.4%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-1055" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bpw5-xeju-93f3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87079?format=api", "vulnerability_id": "VCID-c27j-6m3j-mqer", "summary": "rhds/389: plaintext password disclosure in audit log", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2746.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66285", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66312", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66281", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66329", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66342", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66362", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.6635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66319", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66355", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66371", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00509", "scoring_system": "epss", "scoring_elements": "0.66356", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2746" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=833482", "reference_id": "833482", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833482" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0997", "reference_id": "RHSA-2012:0997", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1041", "reference_id": "RHSA-2012:1041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1041" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584542?format=api", "purl": "pkg:deb/debian/389-ds-base@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-2746" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c27j-6m3j-mqer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86734?format=api", "vulnerability_id": "VCID-dyu2-n7b9-tfam", "summary": "389-ds: unauthenticated denial of service vulnerability in handling of LDAPv3 control data", "references": [ { "reference_url": "http://directory.fedoraproject.org/wiki/Releases/1.3.0.4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://directory.fedoraproject.org/wiki/Releases/1.3.0.4" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0628.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0312.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0312.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0312", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.8033", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80243", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.8025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.8027", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80296", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.803", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80294", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80324", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80326", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0312" }, { "reference_url": "http://secunia.com/advisories/52279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/52279" }, { "reference_url": "http://secunia.com/advisories/52568", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/52568" }, { "reference_url": "https://fedorahosted.org/389/ticket/571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://fedorahosted.org/389/ticket/571" }, { "reference_url": "http://www.securityfocus.com/bid/58428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/58428" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=912964", "reference_id": "912964", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=912964" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0312", "reference_id": "CVE-2013-0312", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0628", "reference_id": "RHSA-2013:0628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0628" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586029?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.0.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.0.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-0312" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dyu2-n7b9-tfam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84816?format=api", "vulnerability_id": "VCID-ewv4-4dk9-8bew", "summary": "389-ds-base: Password verification vulnerable to timing attack", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5405.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69188", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69207", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69257", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69297", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69292", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69301", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69281", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5405" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358865", "reference_id": "1358865", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358865" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842121", "reference_id": "842121", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842121" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2594", "reference_id": "RHSA-2016:2594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2765", "reference_id": "RHSA-2016:2765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2765" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586585?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.5.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.5.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-5405" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ewv4-4dk9-8bew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83184?format=api", "vulnerability_id": "VCID-f3t3-vxrz-8uew", "summary": "389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14638.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14638.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14638", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75028", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75036", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7507", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75082", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75104", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01397", "scoring_system": "epss", "scoring_elements": "0.80433", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01397", "scoring_system": "epss", "scoring_elements": "0.80399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01397", "scoring_system": "epss", "scoring_elements": "0.80428", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01397", "scoring_system": "epss", "scoring_elements": "0.8043", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14638" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626079", "reference_id": "1626079", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626079" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908859", "reference_id": "908859", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2757", "reference_id": "RHSA-2018:2757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2757" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585308?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.0.18-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.0.18-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-14638" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f3t3-vxrz-8uew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85772?format=api", "vulnerability_id": "VCID-f5kv-utgm-1ueu", "summary": "389-ds-base: password hashing bypassed when \"nsslapd-unhashed-pw-switch\" is set to off", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8112.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54086", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54103", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54159", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54189", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54168", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54206", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.5421", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54191", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8112" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172729", "reference_id": "1172729", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172729" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779909", "reference_id": "779909", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0416", "reference_id": "RHSA-2015:0416", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0416" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582878?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.3.5-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.3.5-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-8112" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f5kv-utgm-1ueu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86603?format=api", "vulnerability_id": "VCID-f83m-2rhu-r3fs", "summary": "Server: ACLs inoperative in some search scenarios", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2219.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2219.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2219", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38561", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38643", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38714", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38677", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.3865", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38698", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38676", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38598", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2219" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2219" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718325", "reference_id": "718325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718325" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=979508", "reference_id": "979508", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=979508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1116", "reference_id": "RHSA-2013:1116", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1116" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1119", "reference_id": "RHSA-2013:1119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1119" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582316?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.2.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.2.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-2219" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f83m-2rhu-r3fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83125?format=api", "vulnerability_id": "VCID-gmg8-mepq-87ez", "summary": "389-ds-base: Mishandled search requests in servers/slapd/search.c:do_search() allows for denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14648.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14648.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04251", "scoring_system": "epss", "scoring_elements": "0.88756", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04251", "scoring_system": "epss", "scoring_elements": "0.88765", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04251", "scoring_system": "epss", "scoring_elements": "0.88781", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04251", "scoring_system": "epss", "scoring_elements": "0.88783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04251", "scoring_system": "epss", "scoring_elements": "0.88799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04251", "scoring_system": "epss", "scoring_elements": "0.88804", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04251", "scoring_system": "epss", "scoring_elements": "0.88817", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04251", "scoring_system": "epss", "scoring_elements": "0.88811", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07503", "scoring_system": "epss", "scoring_elements": "0.91812", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07503", "scoring_system": "epss", "scoring_elements": "0.918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07503", "scoring_system": "epss", "scoring_elements": "0.91819", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14648" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1630668", "reference_id": "1630668", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1630668" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3127", "reference_id": "RHSA-2018:3127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3127" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3507", "reference_id": "RHSA-2018:3507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3507" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585308?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.0.18-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.0.18-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-14648" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmg8-mepq-87ez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85630?format=api", "vulnerability_id": "VCID-gmpt-rg5q-n3dk", "summary": "389-ds-base: nsSSL3Ciphers preference not enforced server side (regression)", "references": [ { "reference_url": "http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-3-12.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-3-12.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168985.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168985.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3230.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3230.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3230", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69659", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69561", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69589", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69628", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69669", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00606", "scoring_system": "epss", "scoring_elements": "0.69678", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3230" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230996", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1230996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3230", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3230" }, { "reference_url": "https://fedorahosted.org/389/ticket/48194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://fedorahosted.org/389/ticket/48194" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1232096", "reference_id": "1232096", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1232096" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=789202", "reference_id": "789202", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=789202" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3230", "reference_id": "CVE-2015-3230", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3230" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585498?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.3.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.3.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-3230" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmpt-rg5q-n3dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79721?format=api", "vulnerability_id": "VCID-hjvf-3mm8-xfhq", "summary": "389-ds-base: double free of the virtual attribute context in persistent search", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4091.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4091.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4091", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56877", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56896", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56874", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56903", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56853", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56905", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56908", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56917", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56908", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56929", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00343", "scoring_system": "epss", "scoring_elements": "0.56813", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4091" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030307", "reference_id": "2030307", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0628", "reference_id": "RHSA-2022:0628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0889", "reference_id": "RHSA-2022:0889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0952", "reference_id": "RHSA-2022:0952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1410", "reference_id": "RHSA-2022:1410", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1410" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582292?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/584522?format=api", "purl": "pkg:deb/debian/389-ds-base@2.0.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.0.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-4091" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hjvf-3mm8-xfhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83255?format=api", "vulnerability_id": "VCID-hvag-zpvk-vqbw", "summary": "389-ds-base: ldapsearch with server side sort allows users to cause a crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10935.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10935.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10935", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62829", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62887", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62917", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62881", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62932", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62966", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62954", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62973", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.6298", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62959", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10935" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10935" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1613606", "reference_id": "1613606", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1613606" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906985", "reference_id": "906985", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906985" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2757", "reference_id": "RHSA-2018:2757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2757" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582346?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.0.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.0.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-10935" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvag-zpvk-vqbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84087?format=api", "vulnerability_id": "VCID-jge6-uqra-yba1", "summary": "389-ds-base: Password brute-force possible for locked account due to different return codes", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49699", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61866", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61915", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61932", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61953", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61964", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61791", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61864", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7551" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477669", "reference_id": "1477669", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477669" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870752", "reference_id": "870752", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2569", "reference_id": "RHSA-2017:2569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2569" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584132?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.6.7-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.6.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7551" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jge6-uqra-yba1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77774?format=api", "vulnerability_id": "VCID-kbvd-dfmn-buat", "summary": "389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1062.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1062.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1062", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05629", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05666", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0566", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05653", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05608", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05594", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0762", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07768", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1062" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1062", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1062" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066120", "reference_id": "1066120", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066120" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261879", "reference_id": "2261879", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261879" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.7::el8", "reference_id": "cpe:/a:redhat:directory_server:11.7::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.7::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.8::el8", "reference_id": "cpe:/a:redhat:directory_server:11.8::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.8::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12", "reference_id": "cpe:/a:redhat:directory_server:12", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8", "reference_id": "cpe:/a:redhat:directory_server_e4s:11.5::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.2::el9", "reference_id": "cpe:/a:redhat:directory_server_eus:12.2::el9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.2::el9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-1062", "reference_id": "CVE-2024-1062", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1074", "reference_id": "RHSA-2024:1074", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:1074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1372", "reference_id": "RHSA-2024:1372", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:1372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3047", "reference_id": "RHSA-2024:3047", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:3047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4209", "reference_id": "RHSA-2024:4209", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4633", "reference_id": "RHSA-2024:4633", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4633" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5690", "reference_id": "RHSA-2024:5690", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:5690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7458", "reference_id": "RHSA-2024:7458", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:7458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1632", "reference_id": "RHSA-2025:1632", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:1632" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256711", "reference_id": "show_bug.cgi?id=2256711", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256711" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/921464?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.4%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.4%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-1062" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kbvd-dfmn-buat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83626?format=api", "vulnerability_id": "VCID-kkeh-mm7b-quc4", "summary": "389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1054.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1054.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1054", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94456", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.9447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94472", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94482", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94485", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94489", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94491", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.9449", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94504", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94509", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.14722", "scoring_system": "epss", "scoring_elements": "0.94513", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1054" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1054", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1054" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537314", "reference_id": "1537314", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537314" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892124", "reference_id": "892124", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892124" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0414", "reference_id": "RHSA-2018:0414", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0414" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0515", "reference_id": "RHSA-2018:0515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0515" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585619?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.7.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.7.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-1054" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kkeh-mm7b-quc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80201?format=api", "vulnerability_id": "VCID-knxk-357y-efhh", "summary": "389-ds-base: CRYPT password hash with asterisk allows any bind attempt to succeed", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3652.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29958", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30099", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30056", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30022", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30002", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30059", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30095", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3368", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33528", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3652" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1982782", "reference_id": "1982782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1982782" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991405", "reference_id": "991405", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991405" }, { "reference_url": "https://security.archlinux.org/ASA-202107-72", "reference_id": "ASA-202107-72", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-72" }, { "reference_url": "https://security.archlinux.org/AVG-2206", "reference_id": "AVG-2206", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3079", "reference_id": "RHSA-2021:3079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3807", "reference_id": "RHSA-2021:3807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3906", "reference_id": "RHSA-2021:3906", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3906" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3955", "reference_id": "RHSA-2021:3955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3955" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582292?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/586894?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.17-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.17-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-3652" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-knxk-357y-efhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84901?format=api", "vulnerability_id": "VCID-n9jd-zew1-77d7", "summary": "389-ds-base: Heap buffer overflow in uiduniq.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2591.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02774", "scoring_system": "epss", "scoring_elements": "0.86064", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02774", "scoring_system": "epss", "scoring_elements": "0.86042", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02774", "scoring_system": "epss", "scoring_elements": "0.86057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02774", "scoring_system": "epss", "scoring_elements": "0.86054", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02774", "scoring_system": "epss", "scoring_elements": "0.8605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02774", "scoring_system": "epss", "scoring_elements": "0.86067", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02774", "scoring_system": "epss", "scoring_elements": "0.86072", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06828", "scoring_system": "epss", "scoring_elements": "0.91315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06828", "scoring_system": "epss", "scoring_elements": "0.91327", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06828", "scoring_system": "epss", "scoring_elements": "0.91293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06828", "scoring_system": "epss", "scoring_elements": "0.91297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06828", "scoring_system": "epss", "scoring_elements": "0.91308", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2591" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2591" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://pagure.io/389-ds-base/issue/48986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://pagure.io/389-ds-base/issue/48986" }, { "reference_url": "http://www.securityfocus.com/bid/95670", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95670" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381481", "reference_id": "1381481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381481" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851769", "reference_id": "851769", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851769" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2591", "reference_id": "CVE-2017-2591", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2591" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582739?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.5.15-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2591" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n9jd-zew1-77d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80736?format=api", "vulnerability_id": "VCID-pexr-smr8-gbhh", "summary": "389-ds-base: information disclosure during the binding of a DN", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35518.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35518.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35518", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.74018", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.74114", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.74066", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.74105", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.74024", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.7405", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.74021", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.74055", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.7407", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.74091", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00801", "scoring_system": "epss", "scoring_elements": "0.74073", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35518" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565", "reference_id": "1905565", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565" }, { "reference_url": "https://security.archlinux.org/AVG-1482", "reference_id": "AVG-1482", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1482" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0599", "reference_id": "RHSA-2021:0599", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0599" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1086", "reference_id": "RHSA-2021:1086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1243", "reference_id": "RHSA-2021:1243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1258", "reference_id": "RHSA-2021:1258", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1258" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2323", "reference_id": "RHSA-2021:2323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2323" }, { "reference_url": "https://usn.ubuntu.com/USN-5231-1/", "reference_id": "USN-USN-5231-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5231-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585393?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-35518" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pexr-smr8-gbhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85771?format=api", "vulnerability_id": "VCID-ppep-3m4d-93dv", "summary": "389-ds-base: information disclosure through 'cn=changelog' subtree", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8105.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8105.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8105", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64158", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64243", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64254", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.6427", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64283", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64272", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64244", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64289", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8105" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167858", "reference_id": "1167858", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167858" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779909", "reference_id": "779909", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0416", "reference_id": "RHSA-2015:0416", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0416" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0628", "reference_id": "RHSA-2015:0628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0628" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582878?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.3.5-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.3.5-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-8105" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ppep-3m4d-93dv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74023?format=api", "vulnerability_id": "VCID-qkca-awn5-hfas", "summary": "389-ds-base: server crash while modifying `userPassword` using malformed input (Incomplete fix for CVE-2024-2199)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8445.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8445.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8445", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22891", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24331", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2432", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24466", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24351", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24412", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24313", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8445" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8445", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8445" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082852", "reference_id": "1082852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082852" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310110", "reference_id": "2310110", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T19:58:06Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310110" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11", "reference_id": "cpe:/a:redhat:directory_server:11", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12", "reference_id": "cpe:/a:redhat:directory_server:12", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-8445", "reference_id": "CVE-2024-8445", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T19:58:06Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-8445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7434", "reference_id": "RHSA-2024:7434", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T19:58:06Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:7434" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582292?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/585016?format=api", "purl": "pkg:deb/debian/389-ds-base@2.0.11-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.0.11-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-8445" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qkca-awn5-hfas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86175?format=api", "vulnerability_id": "VCID-qp2a-6fbp-gqf4", "summary": "389-ds: unauthenticated information disclosure", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1031.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1032.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3562.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3562.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3562", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53901", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53792", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53811", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53838", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53863", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53861", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53909", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53892", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53875", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.53914", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00307", "scoring_system": "epss", "scoring_elements": "0.5392", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1123477", "reference_id": "1123477", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1123477" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757437", "reference_id": "757437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757437" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3562", "reference_id": "CVE-2014-3562", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1031", "reference_id": "RHSA-2014:1031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1032", "reference_id": "RHSA-2014:1032", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1032" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583109?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.2.21-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.2.21-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3562" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qp2a-6fbp-gqf4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75507?format=api", "vulnerability_id": "VCID-qv4g-5kzs-9kfa", "summary": "389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3657.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67951", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67919", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67956", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.6797", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.679", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.6788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.6793", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67944", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67968", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67955", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3657" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274401", "reference_id": "2274401", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274401" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.7::el8", "reference_id": "cpe:/a:redhat:directory_server:11.7::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.7::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.8::el8", "reference_id": "cpe:/a:redhat:directory_server:11.8::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.8::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.9::el8", "reference_id": "cpe:/a:redhat:directory_server:11.9::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.9::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9", "reference_id": "cpe:/a:redhat:directory_server:12.4::el9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8", "reference_id": "cpe:/a:redhat:directory_server_e4s:11.5::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.2::el9", "reference_id": "cpe:/a:redhat:directory_server_eus:12.2::el9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.2::el9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client", "reference_id": "cpe:/o:redhat:enterprise_linux:7::client", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::client" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode", "reference_id": "cpe:/o:redhat:enterprise_linux:7::computenode", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::computenode" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server", "reference_id": "cpe:/o:redhat:enterprise_linux:7::server", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::server" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation", "reference_id": "cpe:/o:redhat:enterprise_linux:7::workstation", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7::workstation" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-3657", "reference_id": "CVE-2024-3657", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-3657" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3591", "reference_id": "RHSA-2024:3591", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:3591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3837", "reference_id": "RHSA-2024:3837", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:3837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4092", "reference_id": "RHSA-2024:4092", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4209", "reference_id": "RHSA-2024:4209", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4210", "reference_id": "RHSA-2024:4210", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4210" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4235", "reference_id": "RHSA-2024:4235", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4633", "reference_id": "RHSA-2024:4633", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4633" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5690", "reference_id": "RHSA-2024:5690", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:5690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6576", "reference_id": "RHSA-2024:6576", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6576" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7458", "reference_id": "RHSA-2024:7458", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:7458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1632", "reference_id": "RHSA-2025:1632", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-05T20:48:33Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:1632" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582292?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583535?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.1%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.1%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-3657" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv4g-5kzs-9kfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75349?format=api", "vulnerability_id": "VCID-rffx-mwhe-tqe5", "summary": "389-ds-base: Malformed userPassword hash may cause Denial of Service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5953.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5953.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5953", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21382", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21407", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21414", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21542", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21357", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21434", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21468", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5953" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5953", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5953" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292104", "reference_id": "2292104", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292104" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.7::el8", "reference_id": "cpe:/a:redhat:directory_server:11.7::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.7::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.9::el8", "reference_id": "cpe:/a:redhat:directory_server:11.9::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.9::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9", "reference_id": "cpe:/a:redhat:directory_server:12.4::el9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8", "reference_id": "cpe:/a:redhat:directory_server_e4s:11.5::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.2::el9", "reference_id": "cpe:/a:redhat:directory_server_eus:12.2::el9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.2::el9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-5953", "reference_id": "CVE-2024-5953", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-5953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4633", "reference_id": "RHSA-2024:4633", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4633" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4997", "reference_id": "RHSA-2024:4997", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:4997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5192", "reference_id": "RHSA-2024:5192", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:5192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5690", "reference_id": "RHSA-2024:5690", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:5690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6153", "reference_id": "RHSA-2024:6153", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6153" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6568", "reference_id": "RHSA-2024:6568", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6568" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6569", "reference_id": "RHSA-2024:6569", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6576", "reference_id": "RHSA-2024:6576", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:6576" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7458", "reference_id": "RHSA-2024:7458", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:7458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1632", "reference_id": "RHSA-2025:1632", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-18T13:32:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:1632" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582292?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583535?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.1%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.1%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-5953" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rffx-mwhe-tqe5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87107?format=api", "vulnerability_id": "VCID-run7-4j26-ubam", "summary": "389-ds-base: Change on SLAPI_MODRDN_NEWSUPERIOR is not evaluated in ACL (ACL rules bypass possible)", "references": [ { "reference_url": "http://git.fedorahosted.org/cgit/389/ds.git/commit/?id=5beb93d42efb807838c09c5fab898876876f8d09", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.fedorahosted.org/cgit/389/ds.git/commit/?id=5beb93d42efb807838c09c5fab898876876f8d09" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0503.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0503.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4450.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4450.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4450", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5924", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59314", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59302", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59352", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59384", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59382", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59388", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4450" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=860772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860772" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4450" }, { "reference_url": "http://secunia.com/advisories/50713", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50713" }, { "reference_url": "https://fedorahosted.org/389/ticket/340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://fedorahosted.org/389/ticket/340" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/09/26/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/09/26/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/09/26/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/09/26/5" }, { "reference_url": "http://www.securityfocus.com/bid/55690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/55690" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688942", "reference_id": "688942", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688942" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=860603", "reference_id": "860603", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860603" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4450", "reference_id": "CVE-2012-4450", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4450" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0503", "reference_id": "RHSA-2013:0503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0503" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586327?format=api", "purl": "pkg:deb/debian/389-ds-base@1.2.11.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.2.11.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-4450" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-run7-4j26-ubam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87174?format=api", "vulnerability_id": "VCID-s6gq-duxz-huaf", "summary": "389: denial of service when using certificate groups", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0833.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0833.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0833", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43379", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43317", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43369", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43384", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43403", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43372", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43356", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43416", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43404", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43338", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0833" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=787014", "reference_id": "787014", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=787014" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0813", "reference_id": "RHSA-2012:0813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0549", "reference_id": "RHSA-2013:0549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0549" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584542?format=api", "purl": "pkg:deb/debian/389-ds-base@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-0833" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s6gq-duxz-huaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83405?format=api", "vulnerability_id": "VCID-s9es-be9s-t3h3", "summary": "389-ds-base: race condition on reference counter leads to DoS using persistent search", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10850.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10850.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10850", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01544", "scoring_system": "epss", "scoring_elements": "0.81426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01544", "scoring_system": "epss", "scoring_elements": "0.81388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01544", "scoring_system": "epss", "scoring_elements": "0.81424", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01544", "scoring_system": "epss", "scoring_elements": "0.81425", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02052", "scoring_system": "epss", "scoring_elements": "0.83822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02052", "scoring_system": "epss", "scoring_elements": "0.83837", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02052", "scoring_system": "epss", "scoring_elements": "0.83839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02052", "scoring_system": "epss", "scoring_elements": "0.83862", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02052", "scoring_system": "epss", "scoring_elements": "0.83868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02052", "scoring_system": "epss", "scoring_elements": "0.83885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02052", "scoring_system": "epss", "scoring_elements": "0.83878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02052", "scoring_system": "epss", "scoring_elements": "0.83809", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10850" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10850" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10850" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html" }, { "reference_url": "https://pagure.io/389-ds-base/c/8f04487f99a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://pagure.io/389-ds-base/c/8f04487f99a" }, { "reference_url": "https://pagure.io/389-ds-base/issue/49768", "reference_id": "", "reference_type": "", "scores": [], "url": "https://pagure.io/389-ds-base/issue/49768" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588056", "reference_id": "1588056", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588056" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903501", "reference_id": "903501", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903501" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10850", "reference_id": "CVE-2018-10850", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2757", "reference_id": "RHSA-2018:2757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2757" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582346?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.0.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.0.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-10850" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s9es-be9s-t3h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86721?format=api", "vulnerability_id": "VCID-svsr-ktp8-n7a5", "summary": "389-ds-base: DoS when connecting with a missing username/dn", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0336.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0336.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0336", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.7809", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78007", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78014", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78026", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78057", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78066", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78062", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01102", "scoring_system": "epss", "scoring_elements": "0.78096", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0336" }, { "reference_url": "http://secunia.com/advisories/52763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/52763" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83132" }, { "reference_url": "https://fedorahosted.org/freeipa/ticket/3539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://fedorahosted.org/freeipa/ticket/3539" }, { "reference_url": "https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=7b45e33400355df44e75576ef7f70a39d163bf8e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=7b45e33400355df44e75576ef7f70a39d163bf8e" }, { "reference_url": "http://www.securityfocus.com/bid/58747", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/58747" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704077", "reference_id": "704077", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704077" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=913751", "reference_id": "913751", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913751" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:freeipa:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:freeipa:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:freeipa:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:freeipa:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:freeipa:3.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:freeipa:3.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:freeipa:3.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:freeipa:3.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:freeipa:3.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0336", "reference_id": "CVE-2013-0336", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0336" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582316?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.2.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.2.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-0336" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-svsr-ktp8-n7a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83715?format=api", "vulnerability_id": "VCID-vu7g-kqpe-83hq", "summary": "389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15135.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15135.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15135", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48641", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48681", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48707", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48661", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48715", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48711", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48729", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48703", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48759", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48755", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48713", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15135" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525628", "reference_id": "1525628", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525628" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888451", "reference_id": "888451", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0414", "reference_id": "RHSA-2018:0414", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0414" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0515", "reference_id": "RHSA-2018:0515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0515" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586251?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.7.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.7.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-15135" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vu7g-kqpe-83hq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79162?format=api", "vulnerability_id": "VCID-vx15-pahy-ufbn", "summary": "389-ds-base: SIGSEGV in sync_repl", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2850.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2850.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2850", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56625", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56668", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56622", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56653", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56654", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56659", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2850" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2850" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018054", "reference_id": "1018054", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018054" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118691", "reference_id": "2118691", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:06:25Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118691" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-2850", "reference_id": "CVE-2022-2850", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:06:25Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-2850" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7087", "reference_id": "RHSA-2022:7087", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7087" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7133", "reference_id": "RHSA-2022:7133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8162", "reference_id": "RHSA-2022:8162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8680", "reference_id": "RHSA-2022:8680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8886", "reference_id": "RHSA-2022:8886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8976", "reference_id": "RHSA-2022:8976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0479", "reference_id": "RHSA-2023:0479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0479" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582292?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582866?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-2850" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vx15-pahy-ufbn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86719?format=api", "vulnerability_id": "VCID-w63d-ccdm-dyce", "summary": "389-ds: unintended information exposure when rootdse is enabled", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101323.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101323.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0742.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0742.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1897.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1897.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1897", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.6135", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61199", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61308", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61276", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61339", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61326", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61365", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0041", "scoring_system": "epss", "scoring_elements": "0.61369", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1897" }, { "reference_url": "https://fedorahosted.org/389/ticket/47308", "reference_id": "", "reference_type": "", "scores": [], "url": "https://fedorahosted.org/389/ticket/47308" }, { "reference_url": "https://fedorahosted.org/freeipa/ticket/3540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://fedorahosted.org/freeipa/ticket/3540" }, { "reference_url": "https://git.fedorahosted.org/cgit/389/ds.git/commit/?h=389-ds-base-1.2.11&id=5a18c828533a670e7143327893f8171a19062286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.fedorahosted.org/cgit/389/ds.git/commit/?h=389-ds-base-1.2.11&id=5a18c828533a670e7143327893f8171a19062286" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704421", "reference_id": "704421", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704421" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=928105", "reference_id": "928105", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928105" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:alpha8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.5:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:a4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.6:rc7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.7:alpha3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:alpha3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.8:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.9.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.3.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1897", "reference_id": "CVE-2013-1897", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1897" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0742", "reference_id": "RHSA-2013:0742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0742" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582316?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.2.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.2.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-1897" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w63d-ccdm-dyce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82646?format=api", "vulnerability_id": "VCID-wcyy-45hw-2fc6", "summary": "389-ds-base: DoS via hanging secured connections", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3883.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3883.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3883", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73964", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74053", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.7402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74052", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74061", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73971", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73968", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74002", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74038", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3883" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3883" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3883" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" }, { "reference_url": "https://pagure.io/389-ds-base/issue/50329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://pagure.io/389-ds-base/issue/50329" }, { "reference_url": "https://pagure.io/389-ds-base/pull-request/50331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://pagure.io/389-ds-base/pull-request/50331" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693612", "reference_id": "1693612", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693612" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927939", "reference_id": "927939", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927939" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3883", "reference_id": "CVE-2019-3883", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1896", "reference_id": "RHSA-2019:1896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1896" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3401", "reference_id": "RHSA-2019:3401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3401" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583820?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.1.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.1.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-3883" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wcyy-45hw-2fc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84466?format=api", "vulnerability_id": "VCID-wk61-n55m-j3fg", "summary": "389-ds-base: Remote crash via crafted LDAP messages", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2668.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.91819", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.91874", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.91864", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.91879", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.91876", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.91828", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.91834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.91842", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.91855", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07615", "scoring_system": "epss", "scoring_elements": "0.9186", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2668" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2668" }, { "reference_url": "https://pagure.io/389-ds-base/issue/49220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://pagure.io/389-ds-base/issue/49220" }, { "reference_url": "http://www.securityfocus.com/bid/97524", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97524" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436575", "reference_id": "1436575", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436575" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860125", "reference_id": "860125", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860125" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2668", "reference_id": "CVE-2017-2668", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2668" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0893", "reference_id": "RHSA-2017:0893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0920", "reference_id": "RHSA-2017:0920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0920" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585469?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.5.17-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.5.17-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2668" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wk61-n55m-j3fg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85058?format=api", "vulnerability_id": "VCID-wqg4-uer5-u3fd", "summary": "389-ds-base: Information disclosure via repeated use of LDAP ADD operation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4992.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4992.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4992", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63353", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.6338", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63398", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63415", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63433", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63416", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63423", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63401", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4992" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760", "reference_id": "1347760", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347760" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2594", "reference_id": "RHSA-2016:2594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2765", "reference_id": "RHSA-2016:2765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2765" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585299?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.5.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.5.13-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4992" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqg4-uer5-u3fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79569?format=api", "vulnerability_id": "VCID-x8k9-na1n-8fgj", "summary": "389-ds-base: expired password was still allowed to access the database", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0996.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0996.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0996", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34846", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34722", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34765", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34794", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34769", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34754", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34798", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.3476", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.3869", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0996", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0996" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064769", "reference_id": "2064769", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5239", "reference_id": "RHSA-2022:5239", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5239" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5620", "reference_id": "RHSA-2022:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5823", "reference_id": "RHSA-2022:5823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8162", "reference_id": "RHSA-2022:8162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8976", "reference_id": "RHSA-2022:8976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8976" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582292?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/584522?format=api", "purl": "pkg:deb/debian/389-ds-base@2.0.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.0.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-0996" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8k9-na1n-8fgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86476?format=api", "vulnerability_id": "VCID-x99c-7876-rfas", "summary": "389-ds-base: DoS due to improper handling of ger attr searches", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4485.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58233", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58319", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58313", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58366", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58372", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.5839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58348", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.5838", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58384", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58361", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4485" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024552", "reference_id": "1024552", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024552" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730115", "reference_id": "730115", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730115" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1752", "reference_id": "RHSA-2013:1752", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1752" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1753", "reference_id": "RHSA-2013:1753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1753" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582316?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.2.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.2.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-4485" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x99c-7876-rfas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85692?format=api", "vulnerability_id": "VCID-xq1g-upbu-x7dp", "summary": "389-ds-base: access control bypass with modrdn", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157069.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157069.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1854.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1854.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1854", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.8194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81939", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81838", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81849", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81871", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81867", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.819", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.8192", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81907", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81903", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01632", "scoring_system": "epss", "scoring_elements": "0.81938", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1854" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html" }, { "reference_url": "http://www.securityfocus.com/bid/74392", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/74392" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209573", "reference_id": "1209573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209573" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783923", "reference_id": "783923", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783923" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1854", "reference_id": "CVE-2015-1854", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0895", "reference_id": "RHSA-2015:0895", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0895" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584099?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.3.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.3.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-1854" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xq1g-upbu-x7dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70777?format=api", "vulnerability_id": "VCID-xs3r-chc9-27dr", "summary": "389-ds-base: null pointer dereference leads to denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2487.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2487.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-2487", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68163", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68169", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68181", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68111", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68087", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68139", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68178", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68165", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68132", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-2487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2487" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100994", "reference_id": "1100994", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100994" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353071", "reference_id": "2353071", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353071" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12", "reference_id": "cpe:/a:redhat:directory_server:12", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.4::el9", "reference_id": "cpe:/a:redhat:directory_server_eus:12.4::el9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.4::el9" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-2487", "reference_id": "CVE-2025-2487", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-2487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3663", "reference_id": "RHSA-2025:3663", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:3663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3670", "reference_id": "RHSA-2025:3670", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:3670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4491", "reference_id": "RHSA-2025:4491", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:4491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7395", "reference_id": "RHSA-2025:7395", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:7395" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-2487" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xs3r-chc9-27dr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83387?format=api", "vulnerability_id": "VCID-yaw8-dzr7-hyha", "summary": "389-ds-base: replication and the Retro Changelog plugin store plaintext password by default", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10871.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57882", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58014", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57993", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57985", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57961", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58016", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58035", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10871" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10871" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00032.html" }, { "reference_url": "https://pagure.io/389-ds-base/issue/49789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://pagure.io/389-ds-base/issue/49789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591480", "reference_id": "1591480", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591480" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10871", "reference_id": "CVE-2018-10871", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N" }, { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" }, { "value": "7.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10871" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3401", "reference_id": "RHSA-2019:3401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3401" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582346?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.0.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.0.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-10871" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yaw8-dzr7-hyha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86583?format=api", "vulnerability_id": "VCID-z2f6-17wx-w7e5", "summary": "389-ds-base: ns-slapd crash due to bogus DN", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4283.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4283.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73202", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73223", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73196", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73246", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73271", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73244", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73295", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73287", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4283" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721222", "reference_id": "721222", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721222" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=999634", "reference_id": "999634", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=999634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1182", "reference_id": "RHSA-2013:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1182" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582316?format=api", "purl": "pkg:deb/debian/389-ds-base@1.3.2.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.3.2.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-4283" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z2f6-17wx-w7e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81881?format=api", "vulnerability_id": "VCID-z7kp-3dwk-wkgr", "summary": "389-ds-base: Read permission check bypass via the deref plugin", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14824.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41245", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41269", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41342", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41328", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41371", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41294", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41345", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41373", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14824" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14824" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00036.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1747448", "reference_id": "1747448", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1747448" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944150", "reference_id": "944150", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944150" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:fedoraproject:389_directory_server:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14824", "reference_id": "CVE-2019-14824", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3401", "reference_id": "RHSA-2019:3401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3981", "reference_id": "RHSA-2019:3981", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0464", "reference_id": "RHSA-2020:0464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0464" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584026?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.2.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.2.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582291?format=api", "purl": "pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63rm-mq1r-5fbz" }, { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582294?format=api", "purl": "pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6f2q-qatg-kucr" }, { "vulnerability": "VCID-bpw5-xeju-93f3" }, { "vulnerability": "VCID-kbvd-dfmn-buat" }, { "vulnerability": "VCID-pqe1-ewjj-uqbn" }, { "vulnerability": "VCID-xs3r-chc9-27dr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582295?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-pqe1-ewjj-uqbn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067513?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1072601?format=api", "purl": "pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-14824" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7kp-3dwk-wkgr" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie" }