Page 128 of 671 results (0.006 seconds)

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 0

Novell Netware FTP server NWFTPD before 5.02r allows remote attackers to cause a denial of service (CPU consumption) via a connection to the server followed by a carriage return, and possibly other invalid commands with improper syntax or length. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0059.html http://online.securityfocus.com/archive/1/271589 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2962252.htm http://www.iss.net/security_center/static/9034.php http://www.securityfocus.com/bid/4693 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

IP/IPX gateway for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service via a connection to port 8225 with a large amount of random data, which causes ipipxgw.nlm to ABEND. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html http://online.securityfocus.com/archive/1/271475 http://www.iss.net/security_center/static/9032.php http://www.securityfocus.com/bid/4697 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting vulnerability in Novell Web Search 2.0.1 allows remote attackers to execute arbitrary script as other Web Search users via the search parameter. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0010.html http://seclists.org/bugtraq/2002/Apr/0126.html •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

GWWEB.EXE in GroupWise Web Access 5.5, and possibly other versions, allows remote attackers to determine the full pathname of the web server via an HTTP request with an invalid HTMLVER parameter. • http://marc.info/?l=bugtraq&m=101494830315071&w=2 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password. GroupWise 6, cuando se usa autenticación LDAP y cuando Post Office tiene un un nombre de usuario y contraseña en blanco, permite a atacantes ganar privilegios de otros usuaios iniciando una sesión en el sistema sin con contraseña. • http://marc.info/?l=bugtraq&m=101425369510983&w=2 http://www.securityfocus.com/bid/4154 •