Page 110 of 671 results (0.009 seconds)

CVSS: 5.0EPSS: 5%CPEs: 3EXPL: 0

Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow. • http://secunia.com/advisories/19265 http://securitytracker.com/id?1015781 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973435.htm http://www.osvdb.org/23949 http://www.securityfocus.com/bid/17137 http://www.vupen.com/english/advisories/2006/0975 https://exchange.xforce.ibmcloud.com/vulnerabilities/25289 •

CVSS: 5.0EPSS: 4%CPEs: 2EXPL: 0

Unspecified vulnerability in the HTTP proxy in Novell BorderManager 3.8 and earlier allows remote attackers to cause a denial of service (CPU consumption and ABEND) via unknown attack vectors related to "media streaming over HTTP 1.1". • http://secunia.com/advisories/19163 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972993.htm http://www.osvdb.org/23752 http://www.securityfocus.com/bid/17031 http://www.vupen.com/english/advisories/2006/0879 •

CVSS: 10.0EPSS: 85%CPEs: 2EXPL: 0

Stack-based buffer overflow in the pam_micasa PAM authentication module in CASA on Novell Linux Desktop 9 and Open Enterprise Server 1 allows remote attackers to execute arbitrary code via unspecified vectors. • http://secunia.com/advisories/18995 http://www.novell.com/linux/security/advisories/2006_10_casa.html http://www.securityfocus.com/bid/16779 http://www.vupen.com/english/advisories/2006/0693 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used. • http://www.novell.com/linux/security/advisories/2006_09_gpg.html http://www.novell.com/linux/security/advisories/2006_13_gpg.html http://www.securityfocus.com/bid/16889 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Multiple untrusted search path vulnerabilities in SUSE Linux 10.0 cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) liferea or (2) banshee. • http://osvdb.org/39580 http://secunia.com/advisories/27771 http://sourceforge.net/project/shownotes.php?release_id=555823&group_id=87005 http://www.novell.com/linux/security/advisories/2005_22_sr.html http://www.securityfocus.com/bid/15040 http://www.vupen.com/english/advisories/2007/3965 •