cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2017-9267,https://securityvulnerability.io/vulnerability/CVE-2017-9267,eDirectory LDAP peer certificate validation issue,In Novell eDirectory before 9.0.3.1 the LDAP interface was not strictly enforcing cipher restrictions allowing weaker ciphers to be used during SSL BIND operations.,Novell,Edirectory,6.5,MEDIUM,0.002219999907538295,false,false,false,false,,false,false,2018-03-02T20:29:00.000Z,0 CVE-2017-9277,https://securityvulnerability.io/vulnerability/CVE-2017-9277,existing connection is being used even though eDirectory LDAP server is upgraded to EBA,The LDAP backend in Novell eDirectory before 9.0 SP4 when switched to EBA (Enhanced Background Authentication) kept open connections without EBA.,Novell,Edirectory,4.2,MEDIUM,0.0018100000452250242,false,false,false,false,,false,false,2017-10-02T00:00:00.000Z,0 CVE-2016-9167,https://securityvulnerability.io/vulnerability/CVE-2016-9167,,"NDSD in Novell eDirectory before 9.0.2 did not calculate ACLs on LDAP objects across partition boundaries correctly, which could lead to a privilege escalation by modifying user attributes that would otherwise be filtered by an ACL.",Novell,Novell Edirectory,7.5,HIGH,0.0011899999808520079,false,false,false,false,,false,false,2017-03-23T06:36:00.000Z,0 CVE-2016-5747,https://securityvulnerability.io/vulnerability/CVE-2016-5747,,A security vulnerability in cookie handling in the http stack implementation in NDSD in Novell eDirectory before 9.0.1 allows remote attackers to bypass intended access restrictions by leveraging predictable cookies.,Novell,Novell Edirectory,7.5,HIGH,0.004730000160634518,false,false,false,false,,false,false,2017-03-23T06:36:00.000Z,0 CVE-2016-9168,https://securityvulnerability.io/vulnerability/CVE-2016-9168,,A missing X-Frame-Options header in the NDS Utility Monitor in NDSD in Novell eDirectory before 9.0.2 could be used by remote attackers for clickjacking.,Novell,Novell Edirectory,6.5,MEDIUM,0.00171999994199723,false,false,false,false,,false,false,2017-03-23T06:36:00.000Z,0 CVE-2014-5212,https://securityvulnerability.io/vulnerability/CVE-2014-5212,,Cross-site scripting (XSS) vulnerability in nds/search/data in iMonitor in Novell eDirectory before 8.8 SP8 Patch 4 allows remote attackers to inject arbitrary web script or HTML via the rdn parameter.,Novell,Edirectory,,,0.08688999712467194,false,false,false,false,,false,false,2014-12-19T18:00:00.000Z,0 CVE-2014-5213,https://securityvulnerability.io/vulnerability/CVE-2014-5213,,nds/files/opt/novell/eDirectory/lib64/ndsimon/public/images in iMonitor in Novell eDirectory before 8.8 SP8 Patch 4 allows remote authenticated users to obtain sensitive information from process memory via a direct request.,Novell,Edirectory,,,0.004600000102072954,false,false,false,false,,false,false,2014-12-19T18:00:00.000Z,0 CVE-2010-4327,https://securityvulnerability.io/vulnerability/CVE-2010-4327,,Unspecified vulnerability in the NCP service in Novell eDirectory 8.8.5 before 8.8.5.6 and 8.8.6 before 8.8.6.2 allows remote attackers to cause a denial of service (hang) via a malformed FileSetLock request to port 524.,Novell,Edirectory,,,0.09113000333309174,false,false,false,false,,false,false,2011-02-10T17:00:00.000Z,0 CVE-2009-4654,https://securityvulnerability.io/vulnerability/CVE-2009-4654,,Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to execute arbitrary code via long sadminpwd and verifypwd parameters in a submit action to /dhost/httpstk.,Novell,Edirectory,,,0.7163900136947632,false,false,false,false,,false,false,2010-02-26T18:09:00.000Z,0 CVE-2009-4655,https://securityvulnerability.io/vulnerability/CVE-2009-4655,,"The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote attackers to hijack sessions via a modified cookie.",Novell,Edirectory,,,0.06439000368118286,false,false,false,false,,false,false,2010-02-26T18:09:00.000Z,0 CVE-2009-4653,https://securityvulnerability.io/vulnerability/CVE-2009-4653,,Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to cause a denial of service (dhost.exe crash) and possibly execute arbitrary code via a long string to /dhost/modules?I:.,Novell,Edirectory,,,0.014809999614953995,false,false,false,false,,false,false,2010-02-26T18:09:00.000Z,0 CVE-2010-0666,https://securityvulnerability.io/vulnerability/CVE-2010-0666,,"Unspecified vulnerability in eMBox in Novell eDirectory 8.8 SP5 Patch 2 and earlier allows remote attackers to cause a denial of service (crash) via unknown a crafted SOAP request, a different issue than CVE-2008-0926.",Novell,Edirectory,,,0.011149999685585499,false,false,false,false,,false,false,2010-02-19T17:30:00.000Z,0 CVE-2009-0895,https://securityvulnerability.io/vulnerability/CVE-2009-0895,,Integer overflow in Novell eDirectory 8.7.3.x before 8.7.3.10 ftf2 and 8.8.x before 8.8.5.2 allows remote attackers to execute arbitrary code via an NDS Verb 0x1 request containing a large integer value that triggers a heap-based buffer overflow.,Novell,Edirectory,,,0.5066900253295898,false,false,false,false,,false,false,2009-12-03T17:00:00.000Z,0 CVE-2009-3862,https://securityvulnerability.io/vulnerability/CVE-2009-3862,,"The NDSD process in Novell eDirectory 8.7.3 before 8.7.3.10 ftf2 and eDirectory 8.8 before 8.8.5 ftf1 does not properly handle certain LDAP search requests, which allows remote attackers to cause a denial of service (application hang) via a search request with a NULL BaseDN value.",Novell,Edirectory,,,0.030419999733567238,false,false,false,false,,false,false,2009-11-04T18:00:00.000Z,0 CVE-2009-2457,https://securityvulnerability.io/vulnerability/CVE-2009-2457,,The DS\NDSD component in Novell eDirectory 8.8 before SP5 allows remote attackers to cause a denial of service (crash) via a malformed bind LDAP packet.,Novell,Edirectory,,,0.009770000353455544,false,false,false,false,,false,false,2009-07-14T20:16:00.000Z,0 CVE-2009-2456,https://securityvulnerability.io/vulnerability/CVE-2009-2456,,The DS\NDSD component in Novell eDirectory 8.8 before SP5 allows remote attackers to cause a denial of service (ndsd core dump) via an LDAP request containing multiple . (dot) wildcard characters in the Relative Distinguished Name (RDN).,Novell,Edirectory,,,0.025180000811815262,false,false,false,false,,false,false,2009-07-14T20:16:00.000Z,0 CVE-2009-0192,https://securityvulnerability.io/vulnerability/CVE-2009-0192,,"Off-by-one error in the iMonitor component in Novell eDirectory 8.8 SP3, 8.8 SP3 FTF3, and possibly other versions allows remote attackers to execute arbitrary code via an HTTP request with a crafted Accept-Language header, which triggers a stack-based buffer overflow.",Novell,Edirectory,,,0.4061700105667114,false,false,false,false,,false,false,2009-07-14T20:16:00.000Z,0 CVE-2008-5094,https://securityvulnerability.io/vulnerability/CVE-2008-5094,,Heap-based buffer overflow in the NDS Service in Novell eDirectory before 8.8 SP3 has unknown impact and attack vectors.,Novell,Edirectory,,,0.004670000169426203,false,false,false,false,,false,false,2008-11-14T19:00:00.000Z,0 CVE-2008-5092,https://securityvulnerability.io/vulnerability/CVE-2008-5092,,Heap-based buffer overflows in Novell eDirectory HTTP protocol stack (HTTPSTK) before 8.8 SP3 have unknown impact and attack vectors related to the (1) HTTP language header and (2) HTTP content-length header.,Novell,Edirectory,,,0.004670000169426203,false,false,false,false,,false,false,2008-11-14T19:00:00.000Z,0 CVE-2008-5093,https://securityvulnerability.io/vulnerability/CVE-2008-5093,,Cross-site scripting (XSS) vulnerability in the HTTP Protocol Stack (HTTPSTK) in Novell eDirectory before 8.8 SP3 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.,Novell,Edirectory,,,0.011800000444054604,false,false,false,false,,false,false,2008-11-14T19:00:00.000Z,0 CVE-2008-5091,https://securityvulnerability.io/vulnerability/CVE-2008-5091,,"Buffer overflow in the LDAP Service in Novell eDirectory 8.7.3 before SP10a and 8.8 before SP3 allows attackers to cause a denial of service (application crash) via vectors involving an ""invalid extensibleMatch filter.""",Novell,Edirectory,,,0.009340000338852406,false,false,false,false,,false,false,2008-11-14T19:00:00.000Z,0 CVE-2008-5038,https://securityvulnerability.io/vulnerability/CVE-2008-5038,,"Use-after-free vulnerability in the NetWare Core Protocol (NCP) feature in Novell eDirectory 8.7.3 SP10 before 8.7.3 SP10 FTF1 and 8.8 SP2 for Windows allows remote attackers to cause a denial of service and possibly execute arbitrary code via a sequence of ""Get NCP Extension Information By Name"" requests that cause one thread to operate on memory after it has been freed in another thread, which triggers memory corruption, aka Novell Bug 373852.",Novell,Edirectory,9.8,CRITICAL,0.2998499870300293,false,false,false,false,,false,false,2008-11-12T20:18:00.000Z,0 CVE-2008-4478,https://securityvulnerability.io/vulnerability/CVE-2008-4478,,"Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.73 before 8.7.3.10 ftf1, allow remote attackers to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, which triggers a heap-based buffer overflow.",Novell,Edirectory,,,0.6711300015449524,false,false,false,false,,false,false,2008-10-14T22:00:00.000Z,0 CVE-2008-4479,https://securityvulnerability.io/vulnerability/CVE-2008-4479,,"Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a SOAP request with a long Accept-Language header.",Novell,Edirectory,,,0.7974600195884705,false,false,false,false,,false,false,2008-10-14T22:00:00.000Z,0 CVE-2008-4480,https://securityvulnerability.io/vulnerability/CVE-2008-4480,,"Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.x before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a crafted Netware Core Protocol opcode 0x24 message that triggers a calculation error that under-allocates a heap buffer.",Novell,Edirectory,,,0.8030700087547302,false,false,false,false,,false,false,2008-10-14T22:00:00.000Z,0