Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
edirectory vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-0924
Stack-based buffer overflow in the DoLBURPRequest function in libnldap in ndsd in Novell eDirectory 8.7.3.9 and previous versions, and 8.8.1 and previous versions in the 8.8.x series, allows remote malicious users to cause a denial of service (daemon crash or CPU consumption) or ...
Novell Edirectory
NA
CVE-2008-0926
The SOAP interface to the eMBox module in Novell eDirectory 8.7.3.9 and previous versions, and 8.8.x prior to 8.8.2, relies on client-side authentication, which allows remote malicious users to bypass authentication via requests for /SOAP URIs, and cause a denial of service (daem...
Novell Edirectory 8.5.27
Novell Edirectory 8.6.2
Novell Edirectory 8.7
Novell Edirectory 8.8
Novell Edirectory
Novell Edirectory 8.7.1
Novell Edirectory 8.5
Novell Edirectory 8.5.12a
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.7.3.9
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.8
1 EDB exploit
NA
CVE-2007-3260
HP System Management Homepage (SMH) prior to 2.1.9 for Linux, when used with Novell eDirectory, assigns the eDirectory members to the root group, which allows remote authenticated eDirectory users to gain privileges.
Hp System Management Homepage
NA
CVE-2006-4520
ncp in Novell eDirectory prior to 8.7.3 SP9, and 8.8.x prior to 8.8.1 FTF2, does not properly handle NCP fragments with a negative length, which allows remote malicious users to cause a denial of service (daemon crash) when the heap is written to a log file.
Novell Edirectory 8.8
Novell Edirectory 8.8.1
Novell Edirectory
NA
CVE-2006-5813
Unspecified vulnerability in Novell eDirectory 8.8 allows malicious users to cause a denial of service, as demonstrated by vd_novell3.pm, a "Novell eDirectory 8.8 DoS." NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reli...
Novell Edirectory 8.8
NA
CVE-2006-5814
Unspecified vulnerability in Novell eDirectory allows remote malicious users to execute arbitrary code, as demonstrated by vd_novell.pm, a "Novell eDirectory remote exploit." NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from ...
Novell Edirectory
NA
CVE-2006-4521
The BerDecodeLoginDataRequest function in the libnmasldap.so NMAS module in Novell eDirectory 8.8 and 8.8.1 before the Security Services 2.0.3 patch does not properly increment a pointer when handling certain input, which allows remote malicious users to cause a denial of service...
Novell Edirectory 8.8
Novell Edirectory 8.8.1
NA
CVE-2006-4177
Heap-based buffer overflow in the NCP engine in Novell eDirectory prior to 8.8.1 FTF1 allows remote malicious users to execute arbitrary code via a crafted NCP over IP packet that causes NCP to read more data than intended.
Novell Edirectory
Novell Edirectory 8.8
NA
CVE-2006-5478
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x prior to 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail prior to 3.52e FTF2, allow remote malicious users to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedi...
Novell Edirectory 8.5.27
Novell Edirectory 8.6.2
Novell Edirectory 8.7
Novell Edirectory 8.7.1
Novell Edirectory 8.0
Novell Edirectory 8.7.3
Novell Edirectory 8.5
Novell Edirectory 8.5.12a
Novell Edirectory 8.7.3.8 Presp9
4 EDB exploits
NA
CVE-2006-5479
The NCP Engine in Novell eDirectory prior to 8.7.3.8 FTF1 allows remote malicious users to cause an unspecified denial of service via a certain "NCP Fragment."
Novell Edirectory 8.5
Novell Edirectory 8.5.12a
Novell Edirectory 8.5.27
Novell Edirectory 8.6.2
Novell Edirectory 8.0
Novell Edirectory 8.7
Novell Edirectory 8.7.1
Novell Edirectory
Novell Edirectory 8.7.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »