Page 11 of 79 results (0.001 seconds)

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

The web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to obtain Perl version information via the -v option. El web handler para Perl 5.003 sobre Novell NetWare 5.1 y NetWare 6permite que atacantes remotos obtengan información sobre la versión de Perl con la opción -v. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html http://support.novell.com/servlet/tidfinder/2963307 http://www.iss.net/security_center/static/9917.php http://www.securityfocus.com/bid/5521 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in the interpreter for Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to cause a denial of service (ABEND) via a long module name. Desbordamiento de búfer en el intérprete de Novell NetBasic Scripting Server (NSN) para Netware 5.1 y 6, y Novell Small Business Suite 5.1 y 6, permite a atacantes remotos causar la Denegación de Servicio (ABEND) mediante un nombre de módulo largo. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0199.html http://support.novell.com/servlet/tidfinder/2963297 http://www.iss.net/security_center/static/9911.php http://www.securityfocus.com/bid/5524 •

CVSS: 5.0EPSS: 55%CPEs: 4EXPL: 0

Directory traversal vulnerability in Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to read arbitrary files via a URL containing a "..%5c" sequence (modified dot-dot), which is mapped to the directory separator. Vulnerabilidad de atravesamiento de directorios en Novell NetBasic Scripting Server (NSN) de Netware 5.1 y 6, y Novell Small Business Suite 5.1 y 6, permite a atacantes remotos leer ficheros arbitrarios mediante una URL conteniendo una secuencia "..%5c" (punto punto modificada), que es mapeada al serparador de directorios. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0199.html http://support.novell.com/servlet/tidfinder/2963297 http://www.iss.net/security_center/static/9910.php http://www.securityfocus.com/bid/5523 •

CVSS: 7.5EPSS: 7%CPEs: 4EXPL: 2

The web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary Perl code via an HTTP POST request. El web handler para Perl 5.003 sobre NetWare 6 permite que atacantes remotos ejecuten código Perl arbitrario mediante una petición HTTP POST. • https://www.exploit-db.com/exploits/21731 http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html http://support.novell.com/servlet/tidfinder/2963307 http://www.iss.net/security_center/static/9916.php http://www.securityfocus.com/bid/5520 •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

Directory traversal vulnerability in the web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to read arbitrary files via an HTTP request containing "..%5c" (URL-encoded dot-dot backslash) sequences. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html http://support.novell.com/servlet/tidfinder/2963307 http://www.iss.net/security_center/static/9915.php http://www.securityfocus.com/bid/5522 •