Page 8 of 44 results (0.005 seconds)

CVSS: 4.9EPSS: 0%CPEs: 5EXPL: 0

Unspecified vulnerability in the NCPENGINE in Novell eDirectory 8.7.3.8 allows local users to cause a denial of service (CPU consumption) via unspecified vectors, as originally demonstrated using a Nessus scan. Vulnerabilidad no especificada en el NCPENGINE de Novell eDirectory 8.7.3.8 permite a usuarios locales provocar una denegación de servicio (agotamiento de CPU) a través de vectores no especificados, como se ha demostrado originalmente utilizando un escaneo Nessus. • http://secunia.com/advisories/21496 http://securitytracker.com/id?1016695 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973826.htm http://www.osvdb.org/28369 http://www.securityfocus.com/bid/19498 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The iManager in eMBoxClient.jar in Novell eDirectory 8.7.3.8 writes passwords in plaintext to a log file, which allows local users to obtain passwords by reading the file. El iManager en eMBoxClient.jar en Novell eDirectory 8.7.3.8 escribe contraseñas en texto claro en un archivo de registro, lo que permite a usuarios locales obtener contraseñas leyendo el archivo. • http://secunia.com/advisories/21496 http://securitytracker.com/id?1016695 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973826.htm http://www.osvdb.org/28370 http://www.securityfocus.com/bid/19499 •

CVSS: 7.5EPSS: 92%CPEs: 1EXPL: 2

Buffer overflow in dhost.exe in iMonitor for Novell eDirectory 8.7.3 on Windows allows attackers to cause a denial of service (crash) and obtain access to files via unknown vectors. • https://www.exploit-db.com/exploits/16769 https://www.exploit-db.com/exploits/1152 http://secunia.com/advisories/16393 http://securitytracker.com/id?1014661 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098568.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972038.htm http://www.kb.cert.org/vuls/id/213165 http://www.securityfocus.com/bid/14548 •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 0

Novell eDirectory 8.7.3 allows remote attackers to cause a denial of service (application crash) via a URL containing an MS-DOS device name such as AUX, CON, PRN, COM1, or LPT1. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034536.html http://secunia.com/advisories/15676 http://securitytracker.com/id?1014177 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097766.htm http://www.cirt.dk/advisories/cirt-33-advisory.pdf •

CVSS: 5.0EPSS: 0%CPEs: 252EXPL: 0

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. OpenSSL 0.9.6 anteriores a la 0.9.6d no manejan adecuadamente los tipos de mensajes desconocidos, lo que permite a atacantes remotos causar una denegación de servicios (por bucle infinito), como se demuestra utilizando la herramienta de testeo Codenomicon TLS. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 http://fedoranews.org/updates/FEDORA-2004-095.shtml http://marc.info/?l=bugtraq&m=107955049331965&w=2 http://marc.info/?l=bugtraq&m=108403850228012&w=2 http://rhn.redhat.com/errata/RHSA-2004-119.html http://secunia.com/advisories/11139 http://security.gen •