Page 125 of 671 results (0.007 seconds)

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Novell Netware 5.0 through 5.1 may allow local users to gain "Domain Admin" rights by logging into a Novell Directory Services (NDS) account, and executing "net use" on an NDS_ADM account that is not in the NT domain but has domain access rights, which allows the user to enter a null password. • http://online.securityfocus.com/archive/1/253373 http://www.securityfocus.com/bid/4012 https://exchange.xforce.ibmcloud.com/vulnerabilities/8065 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in Novell NetWare Client 4.80 through 4.83 allows local users to cause a denial of service (crash) by using ping, traceroute, or a similar utility to force the client to resolve a large hostname. • http://support.novell.com/servlet/tidfinder/2962694 http://www.cqure.net/advisories.jsp?id=15 https://exchange.xforce.ibmcloud.com/vulnerabilities/9035 •

CVSS: 7.5EPSS: 6%CPEs: 2EXPL: 0

Buffer overflow in Novell Remote Manager module, httpstk.nlm, in NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary code via a long (1) username or (2) password. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0001.html http://archives.neohapsis.com/archives/bugtraq/2002-04/0088.html http://support.novell.com/servlet/tidfinder/2962026 http://www.iss.net/security_center/static/8736.php http://www.securityfocus.com/bid/4405 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Novell eDirectory 8.6.2 and 8.7 use case insensitive passwords, which makes it easier for remote attackers to conduct brute force password guessing. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0273.html http://www.iss.net/security_center/static/9229.php http://www.securityfocus.com/bid/4893 • CWE-178: Improper Handling of Case Sensitivity •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The Novell Netware client running on Windows 95 allows local users to bypass the login and open arbitrary files via the "What is this?" help feature, which can be launched from the Novell Netware login screen. • http://archives.neohapsis.com/archives/bugtraq/2002-01/0151.html •