Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-run7-4j26-ubam
Summary389-ds-base: Change on SLAPI_MODRDN_NEWSUPERIOR is not evaluated in ACL (ACL rules bypass possible)
Aliases
0
alias CVE-2012-4450
Fixed_packages
0
url pkg:deb/debian/389-ds-base@1.2.11.15-1?distro=trixie
purl pkg:deb/debian/389-ds-base@1.2.11.15-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.2.11.15-1%3Fdistro=trixie
1
url pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie
purl pkg:deb/debian/389-ds-base@1.4.4.11-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63rm-mq1r-5fbz
1
vulnerability VCID-6f2q-qatg-kucr
2
vulnerability VCID-bpw5-xeju-93f3
3
vulnerability VCID-kbvd-dfmn-buat
4
vulnerability VCID-pqe1-ewjj-uqbn
5
vulnerability VCID-xs3r-chc9-27dr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@1.4.4.11-2%3Fdistro=trixie
2
url pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/389-ds-base@2.3.1%2Bdfsg1-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6f2q-qatg-kucr
1
vulnerability VCID-bpw5-xeju-93f3
2
vulnerability VCID-kbvd-dfmn-buat
3
vulnerability VCID-pqe1-ewjj-uqbn
4
vulnerability VCID-xs3r-chc9-27dr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@2.3.1%252Bdfsg1-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/389-ds-base@3.1.2%2Bdfsg1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pqe1-ewjj-uqbn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie
purl pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-1%3Fdistro=trixie
5
url pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie
purl pkg:deb/debian/389-ds-base@3.1.2%2Bvendor1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/389-ds-base@3.1.2%252Bvendor1-2%3Fdistro=trixie
Affected_packages
0
url pkg:rpm/redhat/389-ds-base@1.2.11.15-11?arch=el6
purl pkg:rpm/redhat/389-ds-base@1.2.11.15-11?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-run7-4j26-ubam
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/389-ds-base@1.2.11.15-11%3Farch=el6
References
0
reference_url http://git.fedorahosted.org/cgit/389/ds.git/commit/?id=5beb93d42efb807838c09c5fab898876876f8d09
reference_id
reference_type
scores
url http://git.fedorahosted.org/cgit/389/ds.git/commit/?id=5beb93d42efb807838c09c5fab898876876f8d09
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0503.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0503.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4450.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4450.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4450
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59471
published_at 2026-05-14T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.5924
published_at 2026-04-01T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59314
published_at 2026-04-02T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59337
published_at 2026-04-04T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59302
published_at 2026-04-07T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59352
published_at 2026-04-08T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59365
published_at 2026-04-09T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59384
published_at 2026-04-11T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59367
published_at 2026-04-12T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59349
published_at 2026-04-13T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59382
published_at 2026-04-16T12:55:00Z
11
value 0.00378
scoring_system epss
scoring_elements 0.59388
published_at 2026-04-18T12:55:00Z
12
value 0.00378
scoring_system epss
scoring_elements 0.59369
published_at 2026-04-21T12:55:00Z
13
value 0.00378
scoring_system epss
scoring_elements 0.59346
published_at 2026-04-24T12:55:00Z
14
value 0.00378
scoring_system epss
scoring_elements 0.59366
published_at 2026-04-26T12:55:00Z
15
value 0.00378
scoring_system epss
scoring_elements 0.5935
published_at 2026-04-29T12:55:00Z
16
value 0.00378
scoring_system epss
scoring_elements 0.59308
published_at 2026-05-05T12:55:00Z
17
value 0.00378
scoring_system epss
scoring_elements 0.59357
published_at 2026-05-07T12:55:00Z
18
value 0.00378
scoring_system epss
scoring_elements 0.59414
published_at 2026-05-09T12:55:00Z
19
value 0.00378
scoring_system epss
scoring_elements 0.59373
published_at 2026-05-11T12:55:00Z
20
value 0.00378
scoring_system epss
scoring_elements 0.594
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4450
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=860772
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=860772
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4450
6
reference_url http://secunia.com/advisories/50713
reference_id
reference_type
scores
url http://secunia.com/advisories/50713
7
reference_url https://fedorahosted.org/389/ticket/340
reference_id
reference_type
scores
url https://fedorahosted.org/389/ticket/340
8
reference_url http://www.openwall.com/lists/oss-security/2012/09/26/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/26/3
9
reference_url http://www.openwall.com/lists/oss-security/2012/09/26/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/26/5
10
reference_url http://www.securityfocus.com/bid/55690
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55690
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688942
reference_id 688942
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688942
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=860603
reference_id 860603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=860603
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fedoraproject:389_directory_server:1.2.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4450
reference_id CVE-2012-4450
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4450
15
reference_url https://access.redhat.com/errata/RHSA-2013:0503
reference_id RHSA-2013:0503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0503
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
Severity_range_score6.0 - 6.0
Exploitability0.5
Weighted_severity5.4
Risk_score2.7
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-run7-4j26-ubam