Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
critical path injoin directory server 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-1315
Critical Path (1) InJoin Directory Server or (2) LiveContent Directory allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via malformed BER encodings, as demonstrated by the PROTOS LDAPv3 test suite.
Critical Path Livecontent Directory 8a3
Critical Path Injoin Directory Server 3.0
Critical Path Injoin Directory Server 2.0
Critical Path Injoin Directory Server 4.0
Critical Path Injoin Directory Server 2.1
Critical Path Injoin Directory Server 3.1
NA
CVE-2001-1314
Buffer overflows in Critical Path (1) InJoin Directory Server or (2) LiveContent Directory allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code, as demonstrated by the PROTOS LDAPv3 test suite.
Critical Path Livecontent Directory 8a3
Critical Path Injoin Directory Server 3.0
Critical Path Injoin Directory Server 2.0
Critical Path Injoin Directory Server 4.0
Critical Path Injoin Directory Server 2.1
Critical Path Injoin Directory Server 3.1
NA
CVE-2002-0786
iCon administrative web server for Critical Path inJoin Directory Server 4.0 allows authenticated inJoin administrators to read arbitrary files by specifying the target file in the LOG parameter.
Critical Path Injoin Directory Server 4.0
1 EDB exploit
NA
CVE-2002-0787
Cross-site scripting vulnerabilities in iCon administrative web server for Critical Path inJoin Directory Server 4.0 allow remote malicious users to execute script as the administrator via administrator URLs with modified (1) LOCID or (2) OC parameters.
Critical Path Injoin Directory Server 4.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started