Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell edirectory 8.8 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2008-5038
Use-after-free vulnerability in the NetWare Core Protocol (NCP) feature in Novell eDirectory 8.7.3 SP10 prior to 8.7.3 SP10 FTF1 and 8.8 SP2 for Windows allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a sequence of "Get NCP ...
Novell Edirectory 8.7.3
Novell Edirectory
Novell Edirectory 8.8
7.5
CVSSv3
CVE-2017-5186
Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x prior to 3.0.2.1, Novell eDirectory 8.8.x prior to 8.8 SP8 Patch 9 Hotfix 2, and NetIQ eDirectory 9.x prior to 9.0.2 Hotfix 2 (9.0.2.2) use the deprecated MD5 hashing algorithm in a communications certificate.
Netiq Edirectory 9.0
Netiq Imanager 3.0.1
Novell Imanager
Netiq Imanager 3.0
Netiq Edirectory 9.0.2
Netiq Edirectory 9.0.1
Netiq Imanager 3.0.2
Novell Edirectory
NA
CVE-2014-5212
Cross-site scripting (XSS) vulnerability in nds/search/data in iMonitor in Novell eDirectory prior to 8.8 SP8 Patch 4 allows remote malicious users to inject arbitrary web script or HTML via the rdn parameter.
Novell Edirectory
NA
CVE-2014-5213
nds/files/opt/novell/eDirectory/lib64/ndsimon/public/images in iMonitor in Novell eDirectory prior to 8.8 SP8 Patch 4 allows remote authenticated users to obtain sensitive information from process memory via a direct request.
Novell Edirectory
NA
CVE-2009-4653
Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to cause a denial of service (dhost.exe crash) and possibly execute arbitrary code via a long string to /dhost/modules?I:.
Novell Edirectory 8.8
1 EDB exploit
NA
CVE-2009-4654
Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to execute arbitrary code via long sadminpwd and verifypwd parameters in a submit action to /dhost/httpstk.
Novell Edirectory 8.8
1 EDB exploit
NA
CVE-2010-0666
Unspecified vulnerability in eMBox in Novell eDirectory 8.8 SP5 Patch 2 and previous versions allows remote malicious users to cause a denial of service (crash) via unknown a crafted SOAP request, a different issue than CVE-2008-0926.
Novell Edirectory 8.8
Novell Edirectory 8.5.12a
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.9
Novell Edirectory
Novell Edirectory 8.6.2
Novell Edirectory 8.7
Novell Edirectory 8.7.1
Novell Edirectory 8.5
Novell Edirectory 8.5.27
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.8 Presp9
NA
CVE-2009-0895
Integer overflow in Novell eDirectory 8.7.3.x prior to 8.7.3.10 ftf2 and 8.8.x prior to 8.8.5.2 allows remote malicious users to execute arbitrary code via an NDS Verb 0x1 request containing a large integer value that triggers a heap-based buffer overflow.
Novell Edirectory 8.7.3
Novell Edirectory 8.8
Novell Edirectory 8.7.3.10
Novell Edirectory 8.7.3.8
Novell Edirectory 8.8.5
Novell Edirectory 8.8.1
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.9
NA
CVE-2009-3862
The NDSD process in Novell eDirectory 8.7.3 prior to 8.7.3.10 ftf2 and eDirectory 8.8 prior to 8.8.5 ftf1 does not properly handle certain LDAP search requests, which allows remote malicious users to cause a denial of service (application hang) via a search request with a NULL Ba...
Novell Edirectory 8.7.3
Novell Edirectory 8.8
Novell Edirectory 8.8.1
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.9
NA
CVE-2009-2456
The DS\NDSD component in Novell eDirectory 8.8 before SP5 allows remote malicious users to cause a denial of service (ndsd core dump) via an LDAP request containing multiple . (dot) wildcard characters in the Relative Distinguished Name (RDN).
Novell Edirectory 8.8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »