Lines Matching full:edirectory
3210 <descript source="cve">Multiple integer overflows in dhost.exe in Novell eDirectory
3224 <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497165/100/0/threaded">20081008 ZDI-08-065: Novell eDirectory Core Protocol Opcode 0x0F Heap Overflow Vulnerability</ref>
3225 <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497163/100/0/threaded">20081008 ZDI-08-063: Novell eDirectory dhost.exe Content-Length Header Heap Overflow Vulnerability</ref>
3229 <prod vendor="novell" name="edirectory">
3261 <descript source="cve">Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a SOAP request with a long Accept-Language header.</descript>
3273 <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497164/100/0/threaded">20081008 ZDI-08-064: Novell eDirectory dhost.exe Accept Language Header Heap Overflow Vulnerability</ref>
3277 <prod vendor="novell" name="edirectory">
3307 <descript source="cve">Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.x before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a crafted Netware Core Protocol opcode 0x24 message that triggers a calculation error that under-allocates a heap buffer.</descript>
3319 <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/archive/1/497169/100/0/threaded">20081008 ZDI-08-066: Novell eDirectory Core Protocol Opcode 0x24 Heap Overflow Vulnerability</ref>
3323 <prod vendor="novell" name="edirectory">