Page 2 of 12 results (0.009 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in Novell NetWare 3.x and earlier allows local users to gain privileges via packet spoofing. • http://ciac.llnl.gov/ciac/bulletins/d-01.shtml http://www.iss.net/security_center/static/7213.php •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 1

Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. • http://marc.info/?l=bugtraq&m=93214475111651&w=2 http://www.securityfocus.com/bid/528 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0929 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted. • https://www.exploit-db.com/exploits/19364 http://www.securityfocus.com/bid/482 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

The installation of Novell Netware NDS 5.99 provides an unauthenticated client with Read access for the tree, which allows remote attackers to access sensitive information such as users, groups, and readable objects via CX.EXE and NLIST.EXE. • https://www.exploit-db.com/exploits/19365 http://marc.info/?l=bugtraq&m=90613355902262&w=2 http://www.securityfocus.com/bid/484 https://exchange.xforce.ibmcloud.com/vulnerabilities/1364 •