Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1
Typedeb
Namespacedebian
Name389-ds-base
Version3.1.2+dfsg1-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.1.2+dfsg1-1+deb13u1
Latest_non_vulnerable_version3.1.2+vendor1-2
Affected_by_vulnerabilities
0
url VCID-pqe1-ewjj-uqbn
vulnerability_id VCID-pqe1-ewjj-uqbn
summary 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14905.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14905.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14905
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60773
published_at 2026-05-07T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60726
published_at 2026-05-05T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60792
published_at 2026-05-11T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60831
published_at 2026-05-09T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60819
published_at 2026-05-12T12:55:00Z
5
value 0.00466
scoring_system epss
scoring_elements 0.64403
published_at 2026-04-04T12:55:00Z
6
value 0.00466
scoring_system epss
scoring_elements 0.64373
published_at 2026-04-02T12:55:00Z
7
value 0.00466
scoring_system epss
scoring_elements 0.64363
published_at 2026-04-07T12:55:00Z
8
value 0.00466
scoring_system epss
scoring_elements 0.64411
published_at 2026-04-08T12:55:00Z
9
value 0.00466
scoring_system epss
scoring_elements 0.64427
published_at 2026-04-12T12:55:00Z
10
value 0.00466
scoring_system epss
scoring_elements 0.64439
published_at 2026-04-11T12:55:00Z
11
value 0.00466
scoring_system epss
scoring_elements 0.64398
published_at 2026-04-13T12:55:00Z
12
value 0.00466
scoring_system epss
scoring_elements 0.64433
published_at 2026-04-16T12:55:00Z
13
value 0.00466
scoring_system epss
scoring_elements 0.64444
published_at 2026-04-18T12:55:00Z
14
value 0.00466
scoring_system epss
scoring_elements 0.64437
published_at 2026-04-21T12:55:00Z
15
value 0.00466
scoring_system epss
scoring_elements 0.64458
published_at 2026-04-24T12:55:00Z
16
value 0.00466
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-26T12:55:00Z
17
value 0.00466
scoring_system epss
scoring_elements 0.64469
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14905
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14905
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130910
reference_id 1130910
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130910
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423624
reference_id 2423624
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2423624
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.9::el8
reference_id cpe:/a:redhat:directory_server:11.9::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.9::el8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12
reference_id cpe:/a:redhat:directory_server:12
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:13
reference_id cpe:/a:redhat:directory_server:13
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:13
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:13.1::el10
reference_id cpe:/a:redhat:directory_server:13.1::el10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:13.1::el10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8
reference_id cpe:/a:redhat:directory_server_e4s:11.5::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.7::el8
reference_id cpe:/a:redhat:directory_server_e4s:11.7::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.7::el8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:12.2::el9
reference_id cpe:/a:redhat:directory_server_e4s:12.2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:12.2::el9
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.4::el9
reference_id cpe:/a:redhat:directory_server_eus:12.4::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.4::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::crb
reference_id cpe:/a:redhat:rhel_eus:9.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::crb
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
35
reference_url https://access.redhat.com/security/cve/CVE-2025-14905
reference_id CVE-2025-14905
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/security/cve/CVE-2025-14905
36
reference_url https://access.redhat.com/errata/RHSA-2026:3189
reference_id RHSA-2026:3189
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:3189
37
reference_url https://access.redhat.com/errata/RHSA-2026:3208
reference_id RHSA-2026:3208
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:3208
38
reference_url https://access.redhat.com/errata/RHSA-2026:3379
reference_id RHSA-2026:3379
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:3379
39
reference_url https://access.redhat.com/errata/RHSA-2026:3504
reference_id RHSA-2026:3504
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:3504
40
reference_url https://access.redhat.com/errata/RHSA-2026:4207
reference_id RHSA-2026:4207
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:4207
41
reference_url https://access.redhat.com/errata/RHSA-2026:4661
reference_id RHSA-2026:4661
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:4661
42
reference_url https://access.redhat.com/errata/RHSA-2026:4720
reference_id RHSA-2026:4720
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:4720
43
reference_url https://access.redhat.com/errata/RHSA-2026:5196
reference_id RHSA-2026:5196
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5196
44
reference_url https://access.redhat.com/errata/RHSA-2026:5511
reference_id RHSA-2026:5511
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5511
45
reference_url https://access.redhat.com/errata/RHSA-2026:5512
reference_id RHSA-2026:5512
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5512
46
reference_url https://access.redhat.com/errata/RHSA-2026:5513
reference_id RHSA-2026:5513
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5513
47
reference_url https://access.redhat.com/errata/RHSA-2026:5514
reference_id RHSA-2026:5514
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5514
48
reference_url https://access.redhat.com/errata/RHSA-2026:5568
reference_id RHSA-2026:5568
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5568
49
reference_url https://access.redhat.com/errata/RHSA-2026:5569
reference_id RHSA-2026:5569
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5569
50
reference_url https://access.redhat.com/errata/RHSA-2026:5576
reference_id RHSA-2026:5576
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5576
51
reference_url https://access.redhat.com/errata/RHSA-2026:5597
reference_id RHSA-2026:5597
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5597
52
reference_url https://access.redhat.com/errata/RHSA-2026:5598
reference_id RHSA-2026:5598
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:5598
53
reference_url https://access.redhat.com/errata/RHSA-2026:6220
reference_id RHSA-2026:6220
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:6220
54
reference_url https://access.redhat.com/errata/RHSA-2026:6268
reference_id RHSA-2026:6268
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-23T18:49:43Z/
url https://access.redhat.com/errata/RHSA-2026:6268
fixed_packages
0
url pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1%2Bdeb13u1
purl pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%252Bdeb13u1
1
url pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1
purl pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1
2
url pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2
purl pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2
aliases CVE-2025-14905
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqe1-ewjj-uqbn
Fixing_vulnerabilities
0
url VCID-6f2q-qatg-kucr
vulnerability_id VCID-6f2q-qatg-kucr
summary 389-ds-base: unauthenticated user can trigger a DoS by sending a specific extended search request
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6237.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6237.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6237
reference_id
reference_type
scores
0
value 0.00816
scoring_system epss
scoring_elements 0.74334
published_at 2026-04-09T12:55:00Z
1
value 0.00816
scoring_system epss
scoring_elements 0.74286
published_at 2026-04-07T12:55:00Z
2
value 0.00816
scoring_system epss
scoring_elements 0.74313
published_at 2026-04-04T12:55:00Z
3
value 0.00816
scoring_system epss
scoring_elements 0.74319
published_at 2026-04-08T12:55:00Z
4
value 0.00816
scoring_system epss
scoring_elements 0.74355
published_at 2026-04-11T12:55:00Z
5
value 0.00816
scoring_system epss
scoring_elements 0.74335
published_at 2026-04-12T12:55:00Z
6
value 0.00816
scoring_system epss
scoring_elements 0.74327
published_at 2026-04-13T12:55:00Z
7
value 0.00816
scoring_system epss
scoring_elements 0.74364
published_at 2026-04-16T12:55:00Z
8
value 0.01064
scoring_system epss
scoring_elements 0.77775
published_at 2026-05-05T12:55:00Z
9
value 0.01064
scoring_system epss
scoring_elements 0.77805
published_at 2026-05-07T12:55:00Z
10
value 0.01064
scoring_system epss
scoring_elements 0.77824
published_at 2026-05-09T12:55:00Z
11
value 0.01064
scoring_system epss
scoring_elements 0.77813
published_at 2026-05-11T12:55:00Z
12
value 0.01064
scoring_system epss
scoring_elements 0.7783
published_at 2026-05-12T12:55:00Z
13
value 0.01064
scoring_system epss
scoring_elements 0.77713
published_at 2026-04-18T12:55:00Z
14
value 0.01064
scoring_system epss
scoring_elements 0.77707
published_at 2026-04-21T12:55:00Z
15
value 0.01064
scoring_system epss
scoring_elements 0.77738
published_at 2026-04-24T12:55:00Z
16
value 0.01064
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-26T12:55:00Z
17
value 0.01064
scoring_system epss
scoring_elements 0.77762
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6237
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6237
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6237
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293579
reference_id 2293579
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2293579
5
reference_url https://github.com/389ds/389-ds-base/issues/5989
reference_id 5989
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/
url https://github.com/389ds/389-ds-base/issues/5989
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11
reference_id cpe:/a:redhat:directory_server:11
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9
reference_id cpe:/a:redhat:directory_server:12.4::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12.4::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://access.redhat.com/security/cve/CVE-2024-6237
reference_id CVE-2024-6237
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/
url https://access.redhat.com/security/cve/CVE-2024-6237
15
reference_url https://access.redhat.com/errata/RHSA-2024:4997
reference_id RHSA-2024:4997
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/
url https://access.redhat.com/errata/RHSA-2024:4997
16
reference_url https://access.redhat.com/errata/RHSA-2024:5192
reference_id RHSA-2024:5192
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:16:20Z/
url https://access.redhat.com/errata/RHSA-2024:5192
fixed_packages
0
url pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1
purl pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pqe1-ewjj-uqbn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1
aliases CVE-2024-6237
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6f2q-qatg-kucr
1
url VCID-bpw5-xeju-93f3
vulnerability_id VCID-bpw5-xeju-93f3
summary RHDS: LDAP browser tries to decode userPassword instead of userCertificate attribute
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1055.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1055
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19886
published_at 2026-04-02T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19584
published_at 2026-05-12T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19594
published_at 2026-05-09T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19554
published_at 2026-05-11T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19943
published_at 2026-04-04T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.1967
published_at 2026-04-07T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.1975
published_at 2026-04-08T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19801
published_at 2026-04-09T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19806
published_at 2026-04-11T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19761
published_at 2026-04-12T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19704
published_at 2026-04-13T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.1968
published_at 2026-04-16T12:55:00Z
12
value 0.00063
scoring_system epss
scoring_elements 0.19682
published_at 2026-04-18T12:55:00Z
13
value 0.00063
scoring_system epss
scoring_elements 0.19695
published_at 2026-04-21T12:55:00Z
14
value 0.00063
scoring_system epss
scoring_elements 0.19586
published_at 2026-04-24T12:55:00Z
15
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-26T12:55:00Z
16
value 0.00063
scoring_system epss
scoring_elements 0.19536
published_at 2026-04-29T12:55:00Z
17
value 0.00063
scoring_system epss
scoring_elements 0.19419
published_at 2026-05-05T12:55:00Z
18
value 0.00063
scoring_system epss
scoring_elements 0.19508
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1055
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1055
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034891
reference_id 1034891
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034891
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173517
reference_id 2173517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2173517
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/
reference_id MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T14:02:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZOYQ5TCV6ZEPMDV4CSLK3KINAAO4SRI/
6
reference_url https://access.redhat.com/errata/RHSA-2023:3489
reference_id RHSA-2023:3489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3489
7
reference_url https://access.redhat.com/errata/RHSA-2023:4655
reference_id RHSA-2023:4655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4655
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0
reference_id show_bug.cgi?id=2173517#c0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T14:02:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0
fixed_packages
0
url pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1
purl pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pqe1-ewjj-uqbn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1
aliases CVE-2023-1055
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bpw5-xeju-93f3
2
url VCID-kbvd-dfmn-buat
vulnerability_id VCID-kbvd-dfmn-buat
summary 389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1062.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1062.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1062
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05629
published_at 2026-04-07T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05594
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05633
published_at 2026-04-04T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05666
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05693
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05667
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.0566
published_at 2026-04-12T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05653
published_at 2026-04-13T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05608
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07659
published_at 2026-05-05T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.078
published_at 2026-05-07T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07867
published_at 2026-05-09T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07856
published_at 2026-05-11T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07879
published_at 2026-05-12T12:55:00Z
14
value 0.00027
scoring_system epss
scoring_elements 0.0762
published_at 2026-04-18T12:55:00Z
15
value 0.00027
scoring_system epss
scoring_elements 0.07768
published_at 2026-04-21T12:55:00Z
16
value 0.00027
scoring_system epss
scoring_elements 0.07726
published_at 2026-04-24T12:55:00Z
17
value 0.00027
scoring_system epss
scoring_elements 0.07703
published_at 2026-04-26T12:55:00Z
18
value 0.00027
scoring_system epss
scoring_elements 0.07681
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1062
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1062
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066120
reference_id 1066120
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066120
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2261879
reference_id 2261879
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2261879
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.7::el8
reference_id cpe:/a:redhat:directory_server:11.7::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.7::el8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.8::el8
reference_id cpe:/a:redhat:directory_server:11.8::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:11.8::el8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12
reference_id cpe:/a:redhat:directory_server:12
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8
reference_id cpe:/a:redhat:directory_server_e4s:11.5::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_e4s:11.5::el8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.2::el9
reference_id cpe:/a:redhat:directory_server_eus:12.2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.2::el9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
18
reference_url https://access.redhat.com/security/cve/CVE-2024-1062
reference_id CVE-2024-1062
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://access.redhat.com/security/cve/CVE-2024-1062
19
reference_url https://access.redhat.com/errata/RHSA-2024:1074
reference_id RHSA-2024:1074
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://access.redhat.com/errata/RHSA-2024:1074
20
reference_url https://access.redhat.com/errata/RHSA-2024:1372
reference_id RHSA-2024:1372
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://access.redhat.com/errata/RHSA-2024:1372
21
reference_url https://access.redhat.com/errata/RHSA-2024:3047
reference_id RHSA-2024:3047
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://access.redhat.com/errata/RHSA-2024:3047
22
reference_url https://access.redhat.com/errata/RHSA-2024:4209
reference_id RHSA-2024:4209
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://access.redhat.com/errata/RHSA-2024:4209
23
reference_url https://access.redhat.com/errata/RHSA-2024:4633
reference_id RHSA-2024:4633
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://access.redhat.com/errata/RHSA-2024:4633
24
reference_url https://access.redhat.com/errata/RHSA-2024:5690
reference_id RHSA-2024:5690
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://access.redhat.com/errata/RHSA-2024:5690
25
reference_url https://access.redhat.com/errata/RHSA-2024:7458
reference_id RHSA-2024:7458
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://access.redhat.com/errata/RHSA-2024:7458
26
reference_url https://access.redhat.com/errata/RHSA-2025:1632
reference_id RHSA-2025:1632
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://access.redhat.com/errata/RHSA-2025:1632
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256711
reference_id show_bug.cgi?id=2256711
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T18:08:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2256711
fixed_packages
0
url pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1
purl pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pqe1-ewjj-uqbn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1
aliases CVE-2024-1062
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbvd-dfmn-buat
3
url VCID-xs3r-chc9-27dr
vulnerability_id VCID-xs3r-chc9-27dr
summary 389-ds-base: null pointer dereference leads to denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2487.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-2487
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.23942
published_at 2026-05-12T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.2398
published_at 2026-05-09T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.2394
published_at 2026-04-29T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.23829
published_at 2026-05-05T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.2391
published_at 2026-05-07T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.23923
published_at 2026-05-11T12:55:00Z
6
value 0.00556
scoring_system epss
scoring_elements 0.68087
published_at 2026-04-07T12:55:00Z
7
value 0.00556
scoring_system epss
scoring_elements 0.68154
published_at 2026-04-09T12:55:00Z
8
value 0.00556
scoring_system epss
scoring_elements 0.68178
published_at 2026-04-11T12:55:00Z
9
value 0.00556
scoring_system epss
scoring_elements 0.68165
published_at 2026-04-12T12:55:00Z
10
value 0.00556
scoring_system epss
scoring_elements 0.68132
published_at 2026-04-13T12:55:00Z
11
value 0.00556
scoring_system epss
scoring_elements 0.68169
published_at 2026-04-16T12:55:00Z
12
value 0.00556
scoring_system epss
scoring_elements 0.68181
published_at 2026-04-18T12:55:00Z
13
value 0.00556
scoring_system epss
scoring_elements 0.68163
published_at 2026-04-21T12:55:00Z
14
value 0.00556
scoring_system epss
scoring_elements 0.68206
published_at 2026-04-24T12:55:00Z
15
value 0.00556
scoring_system epss
scoring_elements 0.68092
published_at 2026-04-02T12:55:00Z
16
value 0.00556
scoring_system epss
scoring_elements 0.68111
published_at 2026-04-04T12:55:00Z
17
value 0.00556
scoring_system epss
scoring_elements 0.68139
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-2487
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2487
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100994
reference_id 1100994
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100994
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353071
reference_id 2353071
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2353071
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12
reference_id cpe:/a:redhat:directory_server:12
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server:12
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.4::el9
reference_id cpe:/a:redhat:directory_server_eus:12.4::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:directory_server_eus:12.4::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
16
reference_url https://access.redhat.com/security/cve/CVE-2025-2487
reference_id CVE-2025-2487
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/
url https://access.redhat.com/security/cve/CVE-2025-2487
17
reference_url https://access.redhat.com/errata/RHSA-2025:3663
reference_id RHSA-2025:3663
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/
url https://access.redhat.com/errata/RHSA-2025:3663
18
reference_url https://access.redhat.com/errata/RHSA-2025:3670
reference_id RHSA-2025:3670
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/
url https://access.redhat.com/errata/RHSA-2025:3670
19
reference_url https://access.redhat.com/errata/RHSA-2025:4491
reference_id RHSA-2025:4491
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/
url https://access.redhat.com/errata/RHSA-2025:4491
20
reference_url https://access.redhat.com/errata/RHSA-2025:7395
reference_id RHSA-2025:7395
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T17:48:01Z/
url https://access.redhat.com/errata/RHSA-2025:7395
fixed_packages
0
url pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1
purl pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pqe1-ewjj-uqbn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1
aliases CVE-2025-2487
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xs3r-chc9-27dr
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1