Page 9 of 55 results (0.007 seconds)

CVSS: 7.5EPSS: 95%CPEs: 10EXPL: 4

Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services. Múltiples desbordamientos de búfer basado en pila en Novell eDirectory 8.8.x anterior a 8.8.1 FTF1, y 8.x hasta 8.7.3.8, y Novell NetMail anterior a 3.52e FTF2, permite a atacantes remotos ejecutar código de su elección mediante (1) una cabecera HTTP Host larga, que provoca el desbordamiento en la función BuildRedirectURL; o vectores relacionados con un nombre de usuario que contiene un carácter . (punto) en los servicios Netmail (2) SMTP, (3) POP, (4) IMAP, (5) HTTP o (6) Networked Messaging Application Protocol (NMAP). This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Netmail. • https://www.exploit-db.com/exploits/28835 https://www.exploit-db.com/exploits/28836 https://www.exploit-db.com/exploits/28837 https://www.exploit-db.com/exploits/16773 http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050382.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050388.html http://secunia.com/advisories/22519 http://securitytracker.com/id?1017125 http://securitytracker.com/id?1017141 http://support.novell.com/cgi-bin/search/searchti • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

The NCP Engine in Novell eDirectory before 8.7.3.8 FTF1 allows remote attackers to cause an unspecified denial of service via a certain "NCP Fragment." El motor NCP en Novell eDirectory anterior a 8.7.3.8 FTF1 permite a atacantes remotos provocar una denegación de servicio no especificada mediante un cierto "Fragmento NCP". • http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm •

CVSS: 7.5EPSS: 35%CPEs: 2EXPL: 0

Heap-based buffer overflow in the NCP engine in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted NCP over IP packet that causes NCP to read more data than intended. Desbordamiento de búfer basado en montículo en el motor NCP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante un paquete artesanal NCP sobre IP que provoca que NCP lea más información de la deseada. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=426 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm http://www.securityfocus.com/bid/20664 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29768 •

CVSS: 10.0EPSS: 90%CPEs: 2EXPL: 0

The evtFilteredMonitorEventsRequest function in the LDAP service in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted request containing a value that is larger than the number of objects transmitted, which triggers an invalid free of unallocated memory. La función evtFilteredMonitorEventsRequest en el servicio LDAP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante una petición artesanal que contiene un valor más largo que el número de objetos transmitidos, lo cual dispara una liberación inválida de memoria no asignada. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=428 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://www.securityfocus.com/bid/20663 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29752 •

CVSS: 10.0EPSS: 91%CPEs: 2EXPL: 0

Integer overflow in the evtFilteredMonitorEventsRequest function in the LDAP service in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted request. Desbordamiento de entero en la función evtFilteredMonitorEventsRequest en el servicio LDAP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante una petición artesanal. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=427 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://www.securityfocus.com/bid/20663 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29764 •