Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell edirectory 8.7 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2002-2119
Novell eDirectory 8.6.2 and 8.7 use case insensitive passwords, which makes it easier for remote malicious users to conduct brute force password guessing.
Novell Edirectory 8.6.2
Novell Edirectory 8.7
7.5
CVSSv3
CVE-2004-0079
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 \\(3.005\\)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
NA
CVE-2010-0666
Unspecified vulnerability in eMBox in Novell eDirectory 8.8 SP5 Patch 2 and previous versions allows remote malicious users to cause a denial of service (crash) via unknown a crafted SOAP request, a different issue than CVE-2008-0926.
Novell Edirectory 8.8
Novell Edirectory 8.5.12a
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.9
Novell Edirectory
Novell Edirectory 8.6.2
Novell Edirectory 8.7
Novell Edirectory 8.7.1
Novell Edirectory 8.5
Novell Edirectory 8.5.27
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.8 Presp9
NA
CVE-2008-5091
Buffer overflow in the LDAP Service in Novell eDirectory 8.7.3 before SP10a and 8.8 before SP3 allows malicious users to cause a denial of service (application crash) via vectors involving an "invalid extensibleMatch filter."
Novell Edirectory 8.8
Novell Edirectory 8.8.1
Novell Edirectory 8.8.2
Novell Edirectory 8.7.1
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.9
Novell Edirectory
Novell Edirectory 8.7
Novell Edirectory 8.6.2
Novell Edirectory 8.7.3.10
Novell Edirectory 8.7.3.8
Novell Edirectory 8.0
Novell Edirectory 8.5
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.5.12a
Novell Edirectory 8.5.27
NA
CVE-2008-5092
Heap-based buffer overflows in Novell eDirectory HTTP protocol stack (HTTPSTK) prior to 8.8 SP3 have unknown impact and attack vectors related to the (1) HTTP language header and (2) HTTP content-length header.
Novell Edirectory 8.8.1
Novell Edirectory 8.8
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.9
Novell Edirectory 8.6.2
Novell Edirectory 8.7
Novell Edirectory 85.20
Novell Edirectory 8.8.2
Novell Edirectory 8.5.12a
Novell Edirectory 8.5.27
Novell Edirectory 8.7.3.10
Novell Edirectory 8.7.1
Novell Edirectory
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.0
Novell Edirectory 8.5
NA
CVE-2008-5093
Cross-site scripting (XSS) vulnerability in the HTTP Protocol Stack (HTTPSTK) in Novell eDirectory prior to 8.8 SP3 allows remote malicious users to inject arbitrary web script or HTML via unknown vectors.
Novell Edirectory 8.8
Novell Edirectory 8.8.2
Novell Edirectory 8.8.1
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.9
Novell Edirectory 8.7.1
Novell Edirectory 8.7
Novell Edirectory
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.6.2
Novell Edirectory 8.5.27
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.10
Novell Edirectory 8.5.12a
Novell Edirectory 8.0
NA
CVE-2008-5094
Heap-based buffer overflow in the NDS Service in Novell eDirectory prior to 8.8 SP3 has unknown impact and attack vectors.
Novell Edirectory
Novell Edirectory 8.8
Novell Edirectory 8.8.2
Novell Edirectory 8.8.1
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.9
Novell Edirectory 8.7.1
Novell Edirectory 8.7
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.6.2
Novell Edirectory 8.5.27
Novell Edirectory 8.5.12a
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.10
Novell Edirectory 8.0
NA
CVE-2008-4478
Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 prior to 8.8.3, and 8.73 prior to 8.7.3.10 ftf1, allow remote malicious users to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, whi...
Novell Edirectory 8.8.1
Novell Edirectory 8.8
Novell Edirectory 8.7.3.9
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.7.1
Novell Edirectory 8.7.3
Novell Edirectory
Novell Edirectory 8.7
NA
CVE-2008-0926
The SOAP interface to the eMBox module in Novell eDirectory 8.7.3.9 and previous versions, and 8.8.x prior to 8.8.2, relies on client-side authentication, which allows remote malicious users to bypass authentication via requests for /SOAP URIs, and cause a denial of service (daem...
Novell Edirectory 8.5.27
Novell Edirectory 8.6.2
Novell Edirectory 8.7
Novell Edirectory 8.8
Novell Edirectory
Novell Edirectory 8.7.1
Novell Edirectory 8.5
Novell Edirectory 8.5.12a
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.7.3.9
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.8
1 EDB exploit
NA
CVE-2006-5478
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x prior to 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail prior to 3.52e FTF2, allow remote malicious users to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedi...
Novell Edirectory 8.5.27
Novell Edirectory 8.6.2
Novell Edirectory 8.7
Novell Edirectory 8.7.1
Novell Edirectory 8.0
Novell Edirectory 8.7.3
Novell Edirectory 8.5
Novell Edirectory 8.5.12a
Novell Edirectory 8.7.3.8 Presp9
4 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »