Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2014-5212
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-19 Dec, 2014 | 18:59
Updated At-12 Apr, 2025 | 10:46

Cross-site scripting (XSS) vulnerability in nds/search/data in iMonitor in Novell eDirectory before 8.8 SP8 Patch 4 allows remote attackers to inject arbitrary web script or HTML via the rdn parameter.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

Novell
novell
>>edirectory>>Versions up to 8.8(inclusive)
cpe:2.3:a:novell:edirectory:*:sp8:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/archive/1/534284cve@mitre.org
N/A
http://www.securitytracker.com/id/1031408cve@mitre.org
N/A
https://bugzilla.novell.com/show_bug.cgi?id=904134cve@mitre.org
N/A
https://www.novell.com/support/kb/doc.php?id=3426981cve@mitre.org
Vendor Advisory
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141219-0_NetIQ_eDirectory_iMonitor_XSS_Memory_Disclosure_v10.txtcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/534284af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id/1031408af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.novell.com/show_bug.cgi?id=904134af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.novell.com/support/kb/doc.php?id=3426981af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141219-0_NetIQ_eDirectory_iMonitor_XSS_Memory_Disclosure_v10.txtaf854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found