Page 9 of 45 results (0.011 seconds)

CVSS: 7.5EPSS: 35%CPEs: 2EXPL: 0

Heap-based buffer overflow in the NCP engine in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted NCP over IP packet that causes NCP to read more data than intended. Desbordamiento de búfer basado en montículo en el motor NCP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante un paquete artesanal NCP sobre IP que provoca que NCP lea más información de la deseada. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=426 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm http://www.securityfocus.com/bid/20664 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29768 •

CVSS: 10.0EPSS: 90%CPEs: 2EXPL: 0

The evtFilteredMonitorEventsRequest function in the LDAP service in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted request containing a value that is larger than the number of objects transmitted, which triggers an invalid free of unallocated memory. La función evtFilteredMonitorEventsRequest en el servicio LDAP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante una petición artesanal que contiene un valor más largo que el número de objetos transmitidos, lo cual dispara una liberación inválida de memoria no asignada. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=428 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://www.securityfocus.com/bid/20663 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29752 •

CVSS: 10.0EPSS: 91%CPEs: 2EXPL: 0

Integer overflow in the evtFilteredMonitorEventsRequest function in the LDAP service in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted request. Desbordamiento de entero en la función evtFilteredMonitorEventsRequest en el servicio LDAP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante una petición artesanal. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=427 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://www.securityfocus.com/bid/20663 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29764 •

CVSS: 10.0EPSS: 82%CPEs: 2EXPL: 0

Buffer overflow in iMonitor 2.4 in Novell eDirectory 8.8 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown attack vectors. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell eDirectory. Exploitation does not require authentication. The specific flaw exists within the iMonitor NDS Server, which by default exposes an HTTP interface on TCP port 8028 and an HTTPS interface on TCP port 8030. During the parsing of long URIs to the 'nds' path a trivially exploitable stack-based buffer overflow occurs. • http://secunia.com/advisories/20139 http://securitytracker.com/id?1016120 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973759.htm http://www.osvdb.org/25781 http://www.securityfocus.com/archive/1/434723/100/0/threaded http://www.securityfocus.com/bid/18026 http://www.vupen.com/english/advisories/2006/1850 http://www.zerodayinitiative.com/advisories/ZDI-06-016.html https://exchange.xforce.ibmcloud.com/vulnerabilities/26524 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Novell eDirectory (eDir) 8.6.2 and Netware 5.1 eDir 85.x allows users with expired passwords to gain inappropriate permissions when logging in from Remote Manager. • http://marc.info/?l=bugtraq&m=103712498905027&w=2 http://marc.info/?l=bugtraq&m=103712790808781&w=2 http://www.securityfocus.com/bid/6163 https://exchange.xforce.ibmcloud.com/vulnerabilities/10604 •