Novell eDirectory Multiple Security Vulnerabilities

An attacker can exploit some of these issues through a browser.

Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.

The following exploits are available:


 

Privacy Statement
Copyright 2010, SecurityFocus