Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun java system directory server 7.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2010-0708
Multiple unspecified vulnerabilities in (1) ns-slapd and (2) slapd.exe in Sun Directory Server Enterprise Edition 7.0, Sun Java System Directory Server 5.2, and Sun Java System Directory Server Enterprise Edition 6.0 up to and including 6.3.1 allow remote malicious users to cause...
Sun Java System Directory Server 7.0
Sun Java System Directory Server 6.3.1
Sun Java System Directory Server 6.0
Sun Java System Directory Server 5.2
Sun Java System Directory Server 6.3
Sun Java System Directory Server 6.2
Sun Java System Directory Server 6.1
5
CVSSv2
CVE-2010-0313
The core_get_proxyauth_dn function in ns-slapd in Sun Java System Directory Server Enterprise Edition 7.0 allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted LDAP Search Request message.
Sun Java System Directory Server 7.0
1 EDB exploit
4
CVSSv2
CVE-2006-3921
Sun Java System Application Server (SJSAS) 7 up to and including 8.1 and Web Server (SJSWS) 6.0 and 6.1 allows remote authenticated users to read files outside of the "document root directory" via a direct request using a UTF-8 encoded URI.
Sun Java System Application Server 7.0
Sun Java System Application Server 8.1
Sun Java System Web Server 6.0
Sun Java System Application Server 7.1
Sun Java System Web Server 6.1
7.8
CVSSv2
CVE-2008-5116
Directory traversal vulnerability in idm/includes/helpServer.jsp in Sun Java System Identity Manager 6.0 up to and including 6.0 SP4, 7.0, and 7.1 allows remote malicious users to read arbitrary files in the filesystem of the IDM server via directory traversal sequences in the ex...
Sun Java System Identity Manager 6.0
Sun Java System Identity Manager 7.0
Sun Java System Identity Manager 7.1
7.5
CVSSv2
CVE-2004-0826
Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote malicious users to execute arbitrary code via a modified record length field in an SSLv2 client hello message.
Mozilla Network Security Services 3.2
Mozilla Network Security Services 3.2.1
Mozilla Network Security Services 3.5
Mozilla Network Security Services 3.6
Mozilla Network Security Services 3.7.7
Mozilla Network Security Services 3.8
Netscape Directory Server 4.11
Netscape Directory Server 4.13
Netscape Enterprise Server 3.0.7a
Netscape Enterprise Server 3.0l
Mozilla Network Security Services 3.4.1
Mozilla Network Security Services 3.4.2
Mozilla Network Security Services 3.7.3
Mozilla Network Security Services 3.7.5
Netscape Directory Server 3.12
Netscape Directory Server 4.1
Netscape Enterprise Server 3.0.1
Netscape Enterprise Server 3.0.1b
Netscape Enterprise Server 3.5
Netscape Enterprise Server 3.5.1
Netscape Enterprise Server 4.1.1
Netscape Enterprise Server 4.1
5.8
CVSSv2
CVE-2009-3555
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and previous versions, OpenSSL prior to 0.9.8l, GnuTLS 2.8.5 and previous versions, Mozilla Network Security Ser...
Openssl Openssl 1.0
Apache Http Server
Openssl Openssl
Gnu Gnutls
Mozilla Nss
Debian Debian Linux 5.0
Canonical Ubuntu Linux 10.10
Fedoraproject Fedora 11
Fedoraproject Fedora 13
Debian Debian Linux 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 9.04
Debian Debian Linux 6.0
Fedoraproject Fedora 12
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Fedoraproject Fedora 14
F5 Nginx
2 EDB exploits
10 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started