Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell edirectory 8.8 vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2017-5186
Novell iManager 2.7 before SP7 Patch 9, NetIQ iManager 3.x prior to 3.0.2.1, Novell eDirectory 8.8.x prior to 8.8 SP8 Patch 9 Hotfix 2, and NetIQ eDirectory 9.x prior to 9.0.2 Hotfix 2 (9.0.2.2) use the deprecated MD5 hashing algorithm in a communications certificate.
Netiq Edirectory 9.0
Netiq Imanager 3.0.1
Novell Imanager
Netiq Imanager 3.0
Netiq Edirectory 9.0.2
Netiq Edirectory 9.0.1
Netiq Imanager 3.0.2
Novell Edirectory
356
VMScore
CVE-2014-5213
nds/files/opt/novell/eDirectory/lib64/ndsimon/public/images in iMonitor in Novell eDirectory prior to 8.8 SP8 Patch 4 allows remote authenticated users to obtain sensitive information from process memory via a direct request.
Novell Edirectory
383
VMScore
CVE-2014-5212
Cross-site scripting (XSS) vulnerability in nds/search/data in iMonitor in Novell eDirectory prior to 8.8 SP8 Patch 4 allows remote malicious users to inject arbitrary web script or HTML via the rdn parameter.
Novell Edirectory
905
VMScore
CVE-2009-4654
Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to execute arbitrary code via long sadminpwd and verifypwd parameters in a submit action to /dhost/httpstk.
Novell Edirectory 8.8
1 EDB exploit
905
VMScore
CVE-2009-4653
Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to cause a denial of service (dhost.exe crash) and possibly execute arbitrary code via a long string to /dhost/modules?I:.
Novell Edirectory 8.8
1 EDB exploit
445
VMScore
CVE-2010-0666
Unspecified vulnerability in eMBox in Novell eDirectory 8.8 SP5 Patch 2 and previous versions allows remote malicious users to cause a denial of service (crash) via unknown a crafted SOAP request, a different issue than CVE-2008-0926.
Novell Edirectory 8.8
Novell Edirectory 8.5.12a
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.9
Novell Edirectory
Novell Edirectory 8.6.2
Novell Edirectory 8.7
Novell Edirectory 8.7.1
Novell Edirectory 8.5
Novell Edirectory 8.5.27
Novell Edirectory 8.7.3
Novell Edirectory 8.7.3.8 Presp9
890
VMScore
CVE-2009-0895
Integer overflow in Novell eDirectory 8.7.3.x prior to 8.7.3.10 ftf2 and 8.8.x prior to 8.8.5.2 allows remote malicious users to execute arbitrary code via an NDS Verb 0x1 request containing a large integer value that triggers a heap-based buffer overflow.
Novell Edirectory 8.7.3
Novell Edirectory 8.8
Novell Edirectory 8.7.3.10
Novell Edirectory 8.7.3.8
Novell Edirectory 8.8.5
Novell Edirectory 8.8.1
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.9
445
VMScore
CVE-2009-3862
The NDSD process in Novell eDirectory 8.7.3 prior to 8.7.3.10 ftf2 and eDirectory 8.8 prior to 8.8.5 ftf1 does not properly handle certain LDAP search requests, which allows remote malicious users to cause a denial of service (application hang) via a search request with a NULL Ba...
Novell Edirectory 8.7.3
Novell Edirectory 8.8
Novell Edirectory 8.8.1
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.9
505
VMScore
CVE-2009-0192
Off-by-one error in the iMonitor component in Novell eDirectory 8.8 SP3, 8.8 SP3 FTF3, and possibly other versions allows remote malicious users to execute arbitrary code via an HTTP request with a crafted Accept-Language header, which triggers a stack-based buffer overflow.
Novell Edirectory 8.8
1 EDB exploit
445
VMScore
CVE-2009-2456
The DS\NDSD component in Novell eDirectory 8.8 before SP5 allows remote malicious users to cause a denial of service (ndsd core dump) via an LDAP request containing multiple . (dot) wildcard characters in the Relative Distinguished Name (RDN).
Novell Edirectory 8.8
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »