Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
edirectory Vendor: novell

About This Product

edirectory is a software product offered by novell. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 52 known vulnerabilities affecting novell edirectory. This includes 2 critical-severity issues and 26 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2002 to 2018, indicating a sustained research interest and ongoing security attention. 23 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2002-2119 2002-12-31 2025-04-03 9.8 7.5 Likely
CVE-2002-1552 2003-03-31 2025-04-03 - 7.5 Likely
CVE-2004-0079 2004-11-23 2025-04-03 7.5 5.0 Likely
CVE-2004-0081 2004-11-23 2025-04-03 - 5.0 Likely
CVE-2004-0112 2004-11-23 2025-04-03 - 5.0 Likely
CVE-2005-1729 2005-06-12 2025-04-03 - 5.0 Likely
CVE-2005-2551 2005-08-12 2025-04-03 - 7.5 Likely
CVE-2006-2496 2006-05-20 2025-04-03 - 10.0 Likely
CVE-2006-4185 2006-08-17 2025-04-03 - 4.9 Unknown
CVE-2006-4186 2006-08-17 2025-04-03 - 2.1 Unknown
CVE-2006-4509 2006-10-24 2025-04-09 - 10.0 Likely
CVE-2006-4510 2006-10-24 2025-04-09 - 10.0 Likely
CVE-2006-4177 2006-10-24 2025-04-09 - 7.5 Likely
CVE-2006-5478 2006-10-24 2025-04-09 - 7.5 Likely
CVE-2006-5479 2006-10-24 2025-04-09 - 5.0 Likely
CVE-2006-4521 2006-11-04 2025-04-09 - 5.0 Likely
CVE-2006-5813 2006-11-08 2025-04-09 - 5.0 Likely
CVE-2006-5814 2006-11-08 2025-04-09 - 7.5 Likely
CVE-2006-4520 2007-04-30 2025-04-09 - 7.8 Likely
CVE-2008-0924 2008-03-28 2025-04-09 - 6.8 Likely
CVE-2008-0926 2008-03-28 2025-04-09 - 7.5 Likely
CVE-2008-0927 2008-04-14 2025-04-09 - 5.0 Likely
CVE-2008-1777 2008-04-14 2025-04-09 - 5.0 Likely
CVE-2008-0925 2008-06-18 2025-04-09 - 4.3 Likely
CVE-2008-1809 2008-07-14 2025-04-09 - 10.0 Likely
CVE-2008-3159 2008-07-14 2025-04-09 - 10.0 Likely
CVE-2008-4478 2008-10-14 2025-04-09 - 10.0 Likely
CVE-2008-4479 2008-10-14 2025-04-09 - 10.0 Likely
CVE-2008-4480 2008-10-14 2025-04-09 - 10.0 Likely
CVE-2008-5038 2008-11-12 2025-04-09 9.8 10.0 Likely
CVE-2008-5091 2008-11-14 2025-04-09 - 10.0 Likely
CVE-2008-5092 2008-11-14 2025-04-09 - 10.0 Likely
CVE-2008-5093 2008-11-14 2025-04-09 - 4.3 Likely
CVE-2008-5094 2008-11-14 2025-04-09 - 10.0 Likely
CVE-2009-0192 2009-07-14 2025-04-09 - 5.0 Likely
CVE-2009-2456 2009-07-14 2025-04-09 - 5.0 Likely
CVE-2009-2457 2009-07-14 2025-04-09 - 5.0 Likely
CVE-2009-3862 2009-11-04 2025-04-09 - 5.0 Likely
CVE-2009-0895 2009-12-03 2025-04-09 - 10.0 Likely
CVE-2010-0666 2010-02-19 2025-04-11 - 5.0 Likely
CVE-2009-4653 2010-02-26 2025-04-11 - 9.0 Likely
CVE-2009-4654 2010-02-26 2025-04-11 - 9.0 Likely
CVE-2009-4655 2010-02-26 2025-04-11 - 7.5 Likely
CVE-2010-4327 2011-02-10 2025-04-11 - 5.0 Likely
CVE-2014-5212 2014-12-19 2025-04-12 - 4.3 Likely
CVE-2014-5213 2014-12-19 2025-04-12 - 4.0 Likely
CVE-2016-5747 2017-03-23 2025-04-20 7.5 5.0 Likely
CVE-2016-9167 2017-03-23 2025-04-20 7.5 5.0 Likely
CVE-2016-9168 2017-03-23 2025-04-20 6.5 4.3 Likely
CVE-2017-5186 2017-04-27 2025-04-20 7.5 4.3 Likely
CVE-2017-9267 2018-03-02 2024-11-21 6.5 5.0 Likely
CVE-2017-9277 2018-03-02 2024-11-21 4.2 5.0 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for novell edirectory by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.