Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell edirectory 8.8 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2009-3862
The NDSD process in Novell eDirectory 8.7.3 prior to 8.7.3.10 ftf2 and eDirectory 8.8 prior to 8.8.5 ftf1 does not properly handle certain LDAP search requests, which allows remote malicious users to cause a denial of service (application hang) via a search request with a NULL Ba...
Novell Edirectory 8.7.3
Novell Edirectory 8.8
Novell Edirectory 8.8.1
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.9
5
CVSSv2
CVE-2009-0192
Off-by-one error in the iMonitor component in Novell eDirectory 8.8 SP3, 8.8 SP3 FTF3, and possibly other versions allows remote malicious users to execute arbitrary code via an HTTP request with a crafted Accept-Language header, which triggers a stack-based buffer overflow.
Novell Edirectory 8.8
1 EDB exploit
5
CVSSv2
CVE-2009-2456
The DS\NDSD component in Novell eDirectory 8.8 before SP5 allows remote malicious users to cause a denial of service (ndsd core dump) via an LDAP request containing multiple . (dot) wildcard characters in the Relative Distinguished Name (RDN).
Novell Edirectory 8.8
5
CVSSv2
CVE-2009-2457
The DS\NDSD component in Novell eDirectory 8.8 before SP5 allows remote malicious users to cause a denial of service (crash) via a malformed bind LDAP packet.
Novell Edirectory 8.8
5
CVSSv2
CVE-2006-5813
Unspecified vulnerability in Novell eDirectory 8.8 allows malicious users to cause a denial of service, as demonstrated by vd_novell3.pm, a "Novell eDirectory 8.8 DoS." NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reli...
Novell Edirectory 8.8
5
CVSSv2
CVE-2006-4521
The BerDecodeLoginDataRequest function in the libnmasldap.so NMAS module in Novell eDirectory 8.8 and 8.8.1 before the Security Services 2.0.3 patch does not properly increment a pointer when handling certain input, which allows remote malicious users to cause a denial of service...
Novell Edirectory 8.8
Novell Edirectory 8.8.1
4.3
CVSSv2
CVE-2017-5186
Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x prior to 3.0.2.1, Novell eDirectory 8.8.x prior to 8.8 SP8 Patch 9 Hotfix 2, and NetIQ eDirectory 9.x prior to 9.0.2 Hotfix 2 (9.0.2.2) use the deprecated MD5 hashing algorithm in a communications certificate.
Netiq Edirectory 9.0
Netiq Imanager 3.0.1
Novell Imanager
Netiq Imanager 3.0
Netiq Edirectory 9.0.2
Netiq Edirectory 9.0.1
Netiq Imanager 3.0.2
Novell Edirectory
4.3
CVSSv2
CVE-2014-5212
Cross-site scripting (XSS) vulnerability in nds/search/data in iMonitor in Novell eDirectory prior to 8.8 SP8 Patch 4 allows remote malicious users to inject arbitrary web script or HTML via the rdn parameter.
Novell Edirectory
4.3
CVSSv2
CVE-2008-5093
Cross-site scripting (XSS) vulnerability in the HTTP Protocol Stack (HTTPSTK) in Novell eDirectory prior to 8.8 SP3 allows remote malicious users to inject arbitrary web script or HTML via unknown vectors.
Novell Edirectory 8.8
Novell Edirectory 8.8.2
Novell Edirectory 8.8.1
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.9
Novell Edirectory 8.7.1
Novell Edirectory 8.7
Novell Edirectory
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.6.2
Novell Edirectory 8.5.27
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.10
Novell Edirectory 8.5.12a
Novell Edirectory 8.0
4.3
CVSSv2
CVE-2008-0925
Cross-site scripting (XSS) vulnerability in the iMonitor interface in Novell eDirectory 8.7.3.x prior to 8.7.3 sp10, and 8.8.x prior to 8.8.2 ftf2, allows remote malicious users to inject arbitrary web script or HTML via unspecified parameters that are used within "error mes...
Novell Edirectory 8.8.1
Novell Edirectory 8.8
Novell Edirectory 8.7.3.9
Novell Edirectory 8.8.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »