Page 2 of 10 results (0.010 seconds)

CVSS: 7.5EPSS: 4%CPEs: 4EXPL: 0

Buffer overflow in the portmapper service (PMAP.NLM) in Novell NetWare 6 SP3 and ZenWorks for Desktops 3.2 SP2 through 4.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown attack vectors. • http://secunia.com/advisories/10100 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10088194.htm http://www.securityfocus.com/bid/8907 https://exchange.xforce.ibmcloud.com/vulnerabilities/13564 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Novell NetWare Transaction Tracking System (TTS) in Novell 4.11 and earlier allows remote attackers to cause a denial of service via a large number of requests. • http://archives.neohapsis.com/archives/bugtraq/1999_2/0439.html https://exchange.xforce.ibmcloud.com/vulnerabilities/2184 •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 1

Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. • http://marc.info/?l=bugtraq&m=93214475111651&w=2 http://www.securityfocus.com/bid/528 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted. • https://www.exploit-db.com/exploits/19364 http://www.securityfocus.com/bid/482 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges. • http://ciac.llnl.gov/ciac/bulletins/d-21.shtml http://www.cert.org/advisories/CA-1993-12.html https://exchange.xforce.ibmcloud.com/vulnerabilities/545 •