Page 134 of 671 results (0.009 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted. • https://www.exploit-db.com/exploits/19364 http://www.securityfocus.com/bid/482 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

The installation of Novell Netware NDS 5.99 provides an unauthenticated client with Read access for the tree, which allows remote attackers to access sensitive information such as users, groups, and readable objects via CX.EXE and NLIST.EXE. • https://www.exploit-db.com/exploits/19365 http://marc.info/?l=bugtraq&m=90613355902262&w=2 http://www.securityfocus.com/bid/484 https://exchange.xforce.ibmcloud.com/vulnerabilities/1364 •

CVSS: 2.1EPSS: 88%CPEs: 14EXPL: 0

ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts. Información ICMP como (1) máscara de red y (2) marca de tiempo está permitida desde hosts arbitrarios. • http://descriptions.securescout.com/tc/11010 http://descriptions.securescout.com/tc/11011 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&externalId=1434 http://www.osvdb.org/95 https://exchange.xforce.ibmcloud.com/vulnerabilities/306 https://exchange.xforce.ibmcloud.com/vulnerabilities/322 https://kc.mcafee.com/corporate/index?page=content&id=SB10053 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 6%CPEs: 2EXPL: 0

ICMP redirect messages may crash or lock up a host. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ154174 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server. • https://www.exploit-db.com/exploits/20448 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0175 •