Page 15 of 79 results (0.004 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in Novell NetWare 3.x and earlier allows local users to gain privileges via packet spoofing. • http://ciac.llnl.gov/ciac/bulletins/d-01.shtml http://www.iss.net/security_center/static/7213.php •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

NetWare NFS mode 1 and 2 implements the "Read Only" flag in Unix by changing the ownership of a file to root, which allows local users to gain root privileges by creating a setuid program and setting it to "Read Only," which NetWare-NFS changes to a setuid root program. • http://marc.info/?l=bugtraq&m=88427711321769&w=2 http://marc.info/?l=bugtraq&m=90295697702474&w=2 http://support.novell.com/cgi-bin/search/tidfinder.cgi?2940551 http://www.iss.net/security_center/static/7246.php •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 1

Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. • http://marc.info/?l=bugtraq&m=93214475111651&w=2 http://www.securityfocus.com/bid/528 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0929 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted. • https://www.exploit-db.com/exploits/19364 http://www.securityfocus.com/bid/482 •