Page 5 of 33 results (0.005 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 3

Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to obtain sensitive server information, including the internal IP address, via a direct request to (1) snoop.jsp, (2) SnoopServlet, (3) env.bas, or (4) lcgitest.nlm. • https://www.exploit-db.com/exploits/23586 https://www.exploit-db.com/exploits/23587 https://www.exploit-db.com/exploits/23588 http://marc.info/?l=bugtraq&m=107487862304440&w=2 http://secunia.com/advisories/10711 http://www.osvdb.org/3715 http://www.osvdb.org/3720 http://www.osvdb.org/3721 http://www.osvdb.org/3722 http://www.osvdb.org/4952 http://www.securityfocus.com/bid/9479 https://exchange.xforce.ibmcloud.com/vulnerabilities/14921 •

CVSS: 7.5EPSS: 4%CPEs: 4EXPL: 0

Buffer overflow in the portmapper service (PMAP.NLM) in Novell NetWare 6 SP3 and ZenWorks for Desktops 3.2 SP2 through 4.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown attack vectors. • http://secunia.com/advisories/10100 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10088194.htm http://www.securityfocus.com/bid/8907 https://exchange.xforce.ibmcloud.com/vulnerabilities/13564 •

CVSS: 5.0EPSS: 4%CPEs: 6EXPL: 1

Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 and 6.0 allows remote attackers to cause a denial of service (ABEND) via a long input string. Desbordamiento de búfer en el manejador PERL CGI2PERL.NLM en Novell Netware 5.1 y 6.0 permite a atacantes remotos causar una denegación de servicio (ABEND) mediante una cadena de entrada larga. • https://www.exploit-db.com/exploits/22949 http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0041.html http://marc.info/?l=bugtraq&m=105897561229347&w=2 http://marc.info/?l=bugtraq&m=105897724931665&w=2 http://support.novell.com/servlet/tidfinder/2966549 http://www.kb.cert.org/vuls/id/185593 http://www.protego.dk/advisories/200301.html •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in the interpreter for Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to cause a denial of service (ABEND) via a long module name. Desbordamiento de búfer en el intérprete de Novell NetBasic Scripting Server (NSN) para Netware 5.1 y 6, y Novell Small Business Suite 5.1 y 6, permite a atacantes remotos causar la Denegación de Servicio (ABEND) mediante un nombre de módulo largo. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0199.html http://support.novell.com/servlet/tidfinder/2963297 http://www.iss.net/security_center/static/9911.php http://www.securityfocus.com/bid/5524 •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

Directory traversal vulnerability in the web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to read arbitrary files via an HTTP request containing "..%5c" (URL-encoded dot-dot backslash) sequences. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html http://support.novell.com/servlet/tidfinder/2963307 http://www.iss.net/security_center/static/9915.php http://www.securityfocus.com/bid/5522 •