Page 119 of 671 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The Telnet listener for Novell iChain Server before 2.2 Field Patch 3b 2.2.116 does not have a password by default, which allows remote attackers to gain access. • http://www.ciac.org/ciac/bulletins/o-080.shtml http://www.securitytracker.com/alerts/2004/Feb/1008961.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15068 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to list directories via a direct request to (1) /com/, (2) /com/novell/, (3) /com/novell/webaccess, or (4) /ns-icons/. • http://marc.info/?l=bugtraq&m=107487862304440&w=2 http://www.osvdb.org/13402 http://www.osvdb.org/13403 http://www.osvdb.org/13404 https://exchange.xforce.ibmcloud.com/vulnerabilities/21749 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The webacc servlet in Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to read arbitrary .htt files via a full pathname in the error parameter. • http://marc.info/?l=bugtraq&m=107487862304440&w=2 •

CVSS: 10.0EPSS: 4%CPEs: 4EXPL: 0

webadmin-apache.conf in Novell Web Manager of Novell NetWare 6.5 uses an uppercase Alias tag with an inconsistent lowercase directory tag for a volume, which allows remote attackers to bypass access control to the WEB-INF folder. • http://secunia.com/advisories/12049 http://securitytracker.com/id?1011012 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10094233.htm http://www.osvdb.org/9103 http://www.securityfocus.com/bid/11000 https://exchange.xforce.ibmcloud.com/vulnerabilities/40478 • CWE-287: Improper Authentication •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Novell Client Firewall (NCF) 2.0, as based on the Agnitum Outpost Firewall, allows local users to execute arbitrary code with SYSTEM privileges by opening the NCF tray icon and using the Help functionality to launch programs with SYSTEM privileges. • http://secunia.com/advisories/11014 http://securitytracker.com/id?1008755 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10090585.htm http://www.ciac.org/ciac/bulletins/o-090.shtml http://www.osvdb.org/4120 http://www.securityfocus.com/bid/9441 https://exchange.xforce.ibmcloud.com/vulnerabilities/15367 •