Page 112 of 671 results (0.010 seconds)

CVSS: 7.5EPSS: 75%CPEs: 1EXPL: 1

Stack-based buffer overflow in the IMAP daemon in Novell Netmail 3.5.2 allows remote attackers to execute arbitrary code via "long verb arguments." • https://www.exploit-db.com/exploits/16483 http://secunia.com/advisories/17641 http://securitytracker.com/id?1015240 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972665.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972672.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972673.htm http://www.osvdb.org/20956 http://www.securityfocus.com/bid/15491 http://www.vupen.com/english/advisories/2005/2494 http://www.zerodayinitiative.com/ad • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 94%CPEs: 1EXPL: 3

Multiple SQL injection vulnerabilities in Novell ZENworks Patch Management 6.x before 6.2.2.181 allow remote attackers to execute arbitrary SQL commands via the (1) Direction parameter to computers/default.asp, and the (2) SearchText, (3) StatusFilter, and (4) computerFilter parameters to reports/default.asp. • https://www.exploit-db.com/exploits/26430 https://www.exploit-db.com/exploits/26429 http://cirt.dk/advisories/cirt-39-advisory.pdf http://secunia.com/advisories/17358 http://securityreason.com/securityalert/124 http://securitytracker.com/id?1015116 http://support.novell.com/cgi-bin/search/searchtid.cgi?10099318.htm http://www.kb.cert.org/vuls/id/536300 http://www.osvdb.org/20362 http://www.osvdb.org/20363 http://www.securityfocus.com/archive/1/414880 http:// •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

chkstat in SuSE Linux 9.0 through 10.0 allows local users to modify permissions of files by creating a hardlink to a file from a world-writable directory, which can cause the link count to drop to 1 when the file is deleted or replaced, which is then modified by chkstat to use weaker permissions. • http://secunia.com/advisories/17290 http://www.novell.com/linux/security/advisories/2005_62_permissions.html http://www.osvdb.org/20263 http://www.securityfocus.com/bid/15182 https://exchange.xforce.ibmcloud.com/vulnerabilities/22853 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0299.html http://secunia.com/advisories/15925 http://secunia.com/secunia_research/2005-23/advisory http://securitytracker.com/id?1015048 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972340.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972433.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972438.htm http://www.osvdb.org/19916 http://www.securityfocus.com/bid/15080 https:/ •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 2

Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key. • https://www.exploit-db.com/exploits/26301 http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0763.html http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037442.html http://marc.info/?l=bugtraq&m=112784386426802&w=2 http://securityreason.com/securityalert/28 http://securitytracker.com/id?1014977 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098814.htm http://support.novell.com/techcenter/search/search.do?cmd=displayKC&docType=%20c&externalId=10098814html&am •