Page 124 of 671 results (0.013 seconds)

CVSS: 7.5EPSS: 7%CPEs: 4EXPL: 2

The web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary Perl code via an HTTP POST request. El web handler para Perl 5.003 sobre NetWare 6 permite que atacantes remotos ejecuten código Perl arbitrario mediante una petición HTTP POST. • https://www.exploit-db.com/exploits/21731 http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html http://support.novell.com/servlet/tidfinder/2963307 http://www.iss.net/security_center/static/9916.php http://www.securityfocus.com/bid/5520 •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

Directory traversal vulnerability in the web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to read arbitrary files via an HTTP request containing "..%5c" (URL-encoded dot-dot backslash) sequences. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html http://support.novell.com/servlet/tidfinder/2963307 http://www.iss.net/security_center/static/9915.php http://www.securityfocus.com/bid/5522 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

RCONAG6 for Novell Netware SP2, while running RconJ in secure mode, allows remote attackers to bypass authentication using the RconJ "Secure IP" (SSL) option during a connection. RCONAG6 de Novell Netware SP2, cuando ejecuta RconJ en modo seguro, permite a atacantes remotos eludir la autenticación usando la opción "SecureIP" (SSL) durante una conexión. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0216.html http://support.novell.com/servlet/tidfinder/2963349 http://www.iss.net/security_center/static/9928.php http://www.kb.cert.org/vuls/id/746251 http://www.securityfocus.com/bid/5541 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Novell eDirectory (eDir) 8.6.2 and Netware 5.1 eDir 85.x allows users with expired passwords to gain inappropriate permissions when logging in from Remote Manager. • http://marc.info/?l=bugtraq&m=103712498905027&w=2 http://marc.info/?l=bugtraq&m=103712790808781&w=2 http://www.securityfocus.com/bid/6163 https://exchange.xforce.ibmcloud.com/vulnerabilities/10604 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 5

Novell NetWare 5.1 installs sample applications that allow remote attackers to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl. • https://www.exploit-db.com/exploits/21488 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10064452.htm http://www.kb.cert.org/vuls/id/159203 http://www.osvdb.org/17461 http://www.osvdb.org/17462 http://www.osvdb.org/17463 http://www.osvdb.org/17464 http://www.osvdb.org/17465 http://www.osvdb.org/17466 http://www.osvdb.org/17467 http://www.osvdb.org/17468 http://www.procheckup.com/security_info/vuln_pr0201.html http://www.proche •