Page 12 of 79 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

RCONAG6 for Novell Netware SP2, while running RconJ in secure mode, allows remote attackers to bypass authentication using the RconJ "Secure IP" (SSL) option during a connection. RCONAG6 de Novell Netware SP2, cuando ejecuta RconJ en modo seguro, permite a atacantes remotos eludir la autenticación usando la opción "SecureIP" (SSL) durante una conexión. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0216.html http://support.novell.com/servlet/tidfinder/2963349 http://www.iss.net/security_center/static/9928.php http://www.kb.cert.org/vuls/id/746251 http://www.securityfocus.com/bid/5541 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 5

Novell NetWare 5.1 installs sample applications that allow remote attackers to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl. • https://www.exploit-db.com/exploits/21488 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10064452.htm http://www.kb.cert.org/vuls/id/159203 http://www.osvdb.org/17461 http://www.osvdb.org/17462 http://www.osvdb.org/17463 http://www.osvdb.org/17464 http://www.osvdb.org/17465 http://www.osvdb.org/17466 http://www.osvdb.org/17467 http://www.osvdb.org/17468 http://www.procheckup.com/security_info/vuln_pr0201.html http://www.proche •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Novell Netware 5.0 through 5.1 may allow local users to gain "Domain Admin" rights by logging into a Novell Directory Services (NDS) account, and executing "net use" on an NDS_ADM account that is not in the NT domain but has domain access rights, which allows the user to enter a null password. • http://online.securityfocus.com/archive/1/253373 http://www.securityfocus.com/bid/4012 https://exchange.xforce.ibmcloud.com/vulnerabilities/8065 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in Novell NetWare Client 4.80 through 4.83 allows local users to cause a denial of service (crash) by using ping, traceroute, or a similar utility to force the client to resolve a large hostname. • http://support.novell.com/servlet/tidfinder/2962694 http://www.cqure.net/advisories.jsp?id=15 https://exchange.xforce.ibmcloud.com/vulnerabilities/9035 •

CVSS: 7.5EPSS: 6%CPEs: 2EXPL: 0

Buffer overflow in Novell Remote Manager module, httpstk.nlm, in NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary code via a long (1) username or (2) password. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0001.html http://archives.neohapsis.com/archives/bugtraq/2002-04/0088.html http://support.novell.com/servlet/tidfinder/2962026 http://www.iss.net/security_center/static/8736.php http://www.securityfocus.com/bid/4405 •