Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-4480
Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.x prior to 8.8.3, and 8.7.3 prior to 8.7.3.10 ftf1, allows remote malicious users to execute arbitrary code via a crafted Netware Core Protocol opcode 0x24 message that triggers a calculation error that under-allocate...
Novell Edirectory
10
CVSSv2
CVE-2008-4478
Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 prior to 8.8.3, and 8.73 prior to 8.7.3.10 ftf1, allow remote malicious users to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, whi...
Novell Edirectory 8.8.1
Novell Edirectory 8.8
Novell Edirectory 8.7.3.9
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.7.1
Novell Edirectory 8.7.3
Novell Edirectory
Novell Edirectory 8.7
10
CVSSv2
CVE-2008-4479
Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 prior to 8.8.3, and 8.7.3 prior to 8.7.3.10 ftf1, allows remote malicious users to execute arbitrary code via a SOAP request with a long Accept-Language header.
Novell Edirectory
10
CVSSv2
CVE-2008-1809
Heap-based buffer overflow in Novell eDirectory 8.7.3 prior to 8.7.3.10b, and 8.8 prior to 8.8.2 FTF2, allows remote malicious users to execute arbitrary code via an LDAP search request containing "NULL search parameters."
Novell Edirectory 8.7.3
Novell Edirectory 8.8
10
CVSSv2
CVE-2008-3159
Integer overflow in ds.dlm, as used by dhost.exe, in Novell eDirectory 8.7.3.10 prior to 8.7.3 SP10b and 8.8 prior to 8.8.2 ftf2 allows remote malicious users to execute arbitrary code via unspecified vectors that trigger a stack-based buffer overflow, related to "flawed ari...
Novell Edirectory 8.8
Novell Edirectory 8.7.3
10
CVSSv2
CVE-2008-2703
Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client prior to 2.0.3 HP1 for Windows allow remote malicious users to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.
Novell Groupwise Messenger 2.0
Novell Groupwise Messenger 2.0.2
Novell Groupwise Messenger 2.0.3
2 EDB exploits
10
CVSSv2
CVE-2008-0935
Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client prior to 4.34 allows remote malicious users to execute arbitrary code via a long argument to the ExecuteRequest method.
Novell Iprint Client 4.32
Novell Iprint
Novell Iprint Client 4.26
1 EDB exploit
10
CVSSv2
CVE-2007-6701
Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP4 for Windows allow remote malicious users to execute arbitrary code via long arguments to multiple unspecified RPC functions, aka Novell bug 287919, a different vulnerability than ...
Novell Client 4.91
10
CVSSv2
CVE-2008-0639
Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote malicious users to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability th...
Novell Client 4.91
10
CVSSv2
CVE-2007-5767
Heap-based buffer overflow in the Client Trust application (clntrust.exe) in Novell BorderManager 3.8 before Update 1.5 allows remote malicious users to execute arbitrary code via a validation request in which the Novell tree name is not properly delimited with a wide-character b...
Novell Bordermanager
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »