Page 2 of 10 results (0.011 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 5

Novell NetWare 5.1 installs sample applications that allow remote attackers to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl. • https://www.exploit-db.com/exploits/21488 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10064452.htm http://www.kb.cert.org/vuls/id/159203 http://www.osvdb.org/17461 http://www.osvdb.org/17462 http://www.osvdb.org/17463 http://www.osvdb.org/17464 http://www.osvdb.org/17465 http://www.osvdb.org/17466 http://www.osvdb.org/17467 http://www.osvdb.org/17468 http://www.procheckup.com/security_info/vuln_pr0201.html http://www.proche •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Novell Netware 5.0 through 5.1 may allow local users to gain "Domain Admin" rights by logging into a Novell Directory Services (NDS) account, and executing "net use" on an NDS_ADM account that is not in the NT domain but has domain access rights, which allows the user to enter a null password. • http://online.securityfocus.com/archive/1/253373 http://www.securityfocus.com/bid/4012 https://exchange.xforce.ibmcloud.com/vulnerabilities/8065 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

Novell NetWare 5.0 allows remote attackers to cause a denial of service by flooding port 40193 with random data. • https://www.exploit-db.com/exploits/20072 http://www.securityfocus.com/bid/1467 http://www.securityfocus.com/templates/archive.pike?list=1&msg=000501bfeab5%249330c3d0%24d801a8c0%40dimuthu.baysidegrp.com.au •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 2

Netscape Enterprise Server in NetWare 5.1 allows remote attackers to cause a denial of service or execute arbitrary commands via a malformed URL. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0264.html http://www.securityfocus.com/bid/1393 https://exchange.xforce.ibmcloud.com/vulnerabilities/4780 •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 1

Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. • http://marc.info/?l=bugtraq&m=93214475111651&w=2 http://www.securityfocus.com/bid/528 •