Page 6 of 33 results (0.007 seconds)

CVSS: 5.0EPSS: 55%CPEs: 4EXPL: 0

Directory traversal vulnerability in Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to read arbitrary files via a URL containing a "..%5c" sequence (modified dot-dot), which is mapped to the directory separator. Vulnerabilidad de atravesamiento de directorios en Novell NetBasic Scripting Server (NSN) de Netware 5.1 y 6, y Novell Small Business Suite 5.1 y 6, permite a atacantes remotos leer ficheros arbitrarios mediante una URL conteniendo una secuencia "..%5c" (punto punto modificada), que es mapeada al serparador de directorios. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0199.html http://support.novell.com/servlet/tidfinder/2963297 http://www.iss.net/security_center/static/9910.php http://www.securityfocus.com/bid/5523 •

CVSS: 7.5EPSS: 7%CPEs: 4EXPL: 2

The web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary Perl code via an HTTP POST request. El web handler para Perl 5.003 sobre NetWare 6 permite que atacantes remotos ejecuten código Perl arbitrario mediante una petición HTTP POST. • https://www.exploit-db.com/exploits/21731 http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html http://support.novell.com/servlet/tidfinder/2963307 http://www.iss.net/security_center/static/9916.php http://www.securityfocus.com/bid/5520 •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

Directory traversal vulnerability in the web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to read arbitrary files via an HTTP request containing "..%5c" (URL-encoded dot-dot backslash) sequences. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0202.html http://support.novell.com/servlet/tidfinder/2963307 http://www.iss.net/security_center/static/9915.php http://www.securityfocus.com/bid/5522 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

RCONAG6 for Novell Netware SP2, while running RconJ in secure mode, allows remote attackers to bypass authentication using the RconJ "Secure IP" (SSL) option during a connection. RCONAG6 de Novell Netware SP2, cuando ejecuta RconJ en modo seguro, permite a atacantes remotos eludir la autenticación usando la opción "SecureIP" (SSL) durante una conexión. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0216.html http://support.novell.com/servlet/tidfinder/2963349 http://www.iss.net/security_center/static/9928.php http://www.kb.cert.org/vuls/id/746251 http://www.securityfocus.com/bid/5541 •

CVSS: 7.5EPSS: 6%CPEs: 2EXPL: 0

Buffer overflow in Novell Remote Manager module, httpstk.nlm, in NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary code via a long (1) username or (2) password. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0001.html http://archives.neohapsis.com/archives/bugtraq/2002-04/0088.html http://support.novell.com/servlet/tidfinder/2962026 http://www.iss.net/security_center/static/8736.php http://www.securityfocus.com/bid/4405 •