Page 7 of 66 results (0.004 seconds)

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 1

15 Jul 1999 — Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. • http://marc.info/?l=bugtraq&m=93214475111651&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

16 Jun 1999 — Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0929 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

09 Apr 1999 — A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted. • https://www.exploit-db.com/exploits/19364 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

18 Sep 1998 — The installation of Novell Netware NDS 5.99 provides an unauthenticated client with Read access for the tree, which allows remote attackers to access sensitive information such as users, groups, and readable objects via CX.EXE and NLIST.EXE. • https://www.exploit-db.com/exploits/19365 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

01 Jan 1997 — ICMP redirect messages may crash or lock up a host. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ154174 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

16 Sep 1993 — LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges. • http://ciac.llnl.gov/ciac/bulletins/d-21.shtml •