Page 111 of 671 results (0.008 seconds)

CVSS: 1.7EPSS: 0%CPEs: 3EXPL: 0

Novell NetMail 3.5.2a, 3.5.2b, and 3.5.2c, when running on Linux, sets the owner and group ID to 500 for certain files, which could allow users or groups with that ID to execute arbitrary code or cause a denial of service by modifying those files. • http://secunia.com/advisories/15763 http://securitytracker.com/id?1014251 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098022.htm http://www.osvdb.org/17456 http://www.securityfocus.com/bid/14005 •

CVSS: 9.3EPSS: 2%CPEs: 1EXPL: 1

Multiple vulnerabilities in the OpenSSL ASN.1 parser, as used in Novell iManager 2.0.2, allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted packets, as demonstrated by "OpenSSL ASN.1 brute forcer." NOTE: this issue might overlap CVE-2004-0079, CVE-2004-0081, or CVE-2004-0112. • http://www.cirt.dk/advisories/cirt-32-advisory.pdf http://www.securityfocus.com/bid/8732 http://www.securityfocus.com/data/vulnerabilities/exploits/ASN.1-Brute.c http://www.vupen.com/english/advisories/2005/0744 •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam. NOTE: in August 2007, the tomboy vector was reported for other distributions. • http://bugs.gentoo.org/show_bug.cgi?id=188806 http://bugs.gentoo.org/show_bug.cgi?id=189249 http://bugs.gentoo.org/show_bug.cgi?id=199841 http://osvdb.org/39577 http://osvdb.org/39578 http://secunia.com/advisories/26480 http://secunia.com/advisories/27608 http://secunia.com/advisories/27621 http://secunia.com/advisories/27799 http://secunia.com/advisories/28339 http://secunia.com/advisories/28672 http://security.gentoo.org/glsa/glsa-200711-12.xml http:/ •

CVSS: 7.5EPSS: 24%CPEs: 1EXPL: 1

Heap-based buffer overflow in Novell Open Enterprise Server Remote Manager (novell-nrm) in Novell SUSE Linux Enterprise Server 9 allows remote attackers to execute arbitrary code via an HTTP POST request with a negative Content-Length parameter. • http://secunia.com/advisories/18484 http://securityreason.com/securityalert/348 http://securitytracker.com/id?1015487 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=371 http://www.novell.com/linux/security/advisories/2006_02_novellnrm.html http://www.osvdb.org/22455 http://www.securityfocus.com/bid/16226 https://exchange.xforce.ibmcloud.com/vulnerabilities/24111 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Novell ZENworks for Desktops 4.0.1, ZENworks for Servers 3.0.2, and ZENworks 6.5 Desktop Management does not restrict access to Remote Diagnostics, which allows local users to bypass security policies by using Console One. • http://secunia.com/advisories/17700 http://securitytracker.com/id?1015260 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098818.htm http://www.securityfocus.com/bid/15540 http://www.vupen.com/english/advisories/2005/2544 •