Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell edirectory vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2012-0432
Stack-based buffer overflow in the Novell NCP implementation in NetIQ eDirectory 8.8.7.x prior to 8.8.7.2 allows remote malicious users to have an unspecified impact via unknown vectors.
Microfocus Edirectory 8.8.7.0
Microfocus Edirectory 8.8.7.1
2 EDB exploits
5
CVSSv2
CVE-2010-4327
Unspecified vulnerability in the NCP service in Novell eDirectory 8.8.5 prior to 8.8.5.6 and 8.8.6 prior to 8.8.6.2 allows remote malicious users to cause a denial of service (hang) via a malformed FileSetLock request to port 524.
Novell Edirectory 8.8.6
Novell Edirectory 8.8.5
9
CVSSv2
CVE-2009-4654
Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to execute arbitrary code via long sadminpwd and verifypwd parameters in a submit action to /dhost/httpstk.
Novell Edirectory 8.8
1 EDB exploit
7.5
CVSSv2
CVE-2009-4655
The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote malicious users to hijack sessions via a modified cookie.
Novell Edirectory 8.8.5
1 EDB exploit
9
CVSSv2
CVE-2009-4653
Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to cause a denial of service (dhost.exe crash) and possibly execute arbitrary code via a long string to /dhost/modules?I:.
Novell Edirectory 8.8
1 EDB exploit
5
CVSSv2
CVE-2010-0666
Unspecified vulnerability in eMBox in Novell eDirectory 8.8 SP5 Patch 2 and previous versions allows remote malicious users to cause a denial of service (crash) via unknown a crafted SOAP request, a different issue than CVE-2008-0926.
Novell Edirectory 8.8
Novell Edirectory 8.5.12a
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.9
Novell Edirectory
Novell Edirectory 8.6.2
Novell Edirectory 8.7
Novell Edirectory 8.7.1
Novell Edirectory 8.5
Novell Edirectory 8.5.27
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.8 Presp9
7.5
CVSSv2
CVE-2009-4486
Stack-based buffer overflow in the eDirectory plugin in Novell iManager prior to 2.7.3 allows remote malicious users to execute arbitrary code via vectors that trigger long arguments to an unspecified sub-application, related to importing and exporting from a schema.
Novell Imanager 1.5
Novell Imanager
Novell Imanager 2.7.1
Novell Imanager 2.0.2
Novell Imanager 2.0
Novell Imanager 2.6.0
Novell Imanager 2.5
10
CVSSv2
CVE-2009-0895
Integer overflow in Novell eDirectory 8.7.3.x prior to 8.7.3.10 ftf2 and 8.8.x prior to 8.8.5.2 allows remote malicious users to execute arbitrary code via an NDS Verb 0x1 request containing a large integer value that triggers a heap-based buffer overflow.
Novell Edirectory 8.7.3
Novell Edirectory 8.8
Novell Edirectory 8.7.3.10
Novell Edirectory 8.7.3.8
Novell Edirectory 8.8.5
Novell Edirectory 8.8.1
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.9
5
CVSSv2
CVE-2009-3862
The NDSD process in Novell eDirectory 8.7.3 prior to 8.7.3.10 ftf2 and eDirectory 8.8 prior to 8.8.5 ftf1 does not properly handle certain LDAP search requests, which allows remote malicious users to cause a denial of service (application hang) via a search request with a NULL Ba...
Novell Edirectory 8.7.3
Novell Edirectory 8.8
Novell Edirectory 8.8.1
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.9
5
CVSSv2
CVE-2009-0192
Off-by-one error in the iMonitor component in Novell eDirectory 8.8 SP3, 8.8 SP3 FTF3, and possibly other versions allows remote malicious users to execute arbitrary code via an HTTP request with a crafted Accept-Language header, which triggers a stack-based buffer overflow.
Novell Edirectory 8.8
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »