Page 6 of 79 results (0.005 seconds)

CVSS: 9.1EPSS: 2%CPEs: 1EXPL: 0

11 Apr 2003 — RCONAG6 for Novell Netware SP2, while running RconJ in secure mode, allows remote attackers to bypass authentication using the RconJ "Secure IP" (SSL) option during a connection. RCONAG6 de Novell Netware SP2, cuando ejecuta RconJ en modo seguro, permite a atacantes remotos eludir la autenticación usando la opción "SecureIP" (SSL) durante una conexión. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0216.html •

CVSS: 7.5EPSS: 17%CPEs: 4EXPL: 0

11 Apr 2003 — Directory traversal vulnerability in Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to read arbitrary files via a URL containing a "..%5c" sequence (modified dot-dot), which is mapped to the directory separator. Vulnerabilidad de atravesamiento de directorios en Novell NetBasic Scripting Server (NSN) de Netware 5.1 y 6, y Novell Small Business Suite 5.1 y 6, permite a atacantes remotos leer ficheros arbitrarios mediante una UR... • http://archives.neohapsis.com/archives/bugtraq/2002-08/0199.html •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

11 Apr 2003 — Buffer overflow in the interpreter for Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to cause a denial of service (ABEND) via a long module name. Desbordamiento de búfer en el intérprete de Novell NetBasic Scripting Server (NSN) para Netware 5.1 y 6, y Novell Small Business Suite 5.1 y 6, permite a atacantes remotos causar la Denegación de Servicio (ABEND) mediante un nombre de módulo largo. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0199.html •

CVSS: 9.8EPSS: 8%CPEs: 4EXPL: 2

11 Apr 2003 — The web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary Perl code via an HTTP POST request. El web handler para Perl 5.003 sobre NetWare 6 permite que atacantes remotos ejecuten código Perl arbitrario mediante una petición HTTP POST. • https://www.exploit-db.com/exploits/21731 •

CVSS: 7.5EPSS: 6%CPEs: 4EXPL: 0

11 Apr 2003 — Directory traversal vulnerability in the web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to read arbitrary files via an HTTP request containing "..%5c" (URL-encoded dot-dot backslash) sequences. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

11 Apr 2003 — The web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to obtain Perl version information via the -v option. El web handler para Perl 5.003 sobre Novell NetWare 5.1 y NetWare 6permite que atacantes remotos obtengan información sobre la versión de Perl con la opción -v. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html •

CVSS: 7.5EPSS: 8%CPEs: 2EXPL: 5

31 Dec 2002 — Novell NetWare 5.1 installs sample applications that allow remote attackers to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl. • https://www.exploit-db.com/exploits/21488 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

31 Dec 2002 — Buffer overflow in Novell NetWare Client 4.80 through 4.83 allows local users to cause a denial of service (crash) by using ping, traceroute, or a similar utility to force the client to resolve a large hostname. • http://support.novell.com/servlet/tidfinder/2962694 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2002 — Novell Netware 5.0 through 5.1 may allow local users to gain "Domain Admin" rights by logging into a Novell Directory Services (NDS) account, and executing "net use" on an NDS_ADM account that is not in the NT domain but has domain access rights, which allows the user to enter a null password. • http://online.securityfocus.com/archive/1/253373 •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2002 — The Novell Netware client running on Windows 95 allows local users to bypass the login and open arbitrary files via the "What is this?" help feature, which can be launched from the Novell Netware login screen. • http://archives.neohapsis.com/archives/bugtraq/2002-01/0151.html •