Page 99 of 671 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Novell GroupWise 7 before SP2 20070524, and GroupWise 6 before 6.5 post-SP6 20070522, allows remote attackers to obtain credentials via a man-in-the-middle attack. Novell GroupWise 7 anterior a SP2 20070524, y GroupWise 6 anterior a 6.5 post-SP6 20070522, permite a atacantes remotos obtener credenciales a través de un ataque de "hombre en medio" (man-in-the-middle). • http://osvdb.org/35942 http://secunia.com/advisories/25498 http://securitytracker.com/id?1018180 http://www.securityfocus.com/bid/24258 http://www.vupen.com/english/advisories/2007/2024 https://exchange.xforce.ibmcloud.com/vulnerabilities/34655 https://secure-support.novell.com/KanisaPlatform/Publishing/300/3382383_f.SAL_Public.html •

CVSS: 10.0EPSS: 58%CPEs: 9EXPL: 0

Stack-based buffer overflow in the SSL version of the NMDMC.EXE service in Novell NetMail 3.52e FTF2 and probably earlier allows remote attackers to execute arbitrary code via a crafted request. Desbordamiento de búfer basado en pila en la versión SSL del servicio NMDMC.EXE en Novell NetMail 3.52e FTF2 y posiblemente anteriores permite a atacantes remotos ejecutar código de su elección a través de una respuesta manipulada. • http://download.novell.com/Download?buildid=Ad2xk29hHTg~ http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=532 http://osvdb.org/35941 http://secunia.com/advisories/25204 http://www.securityfocus.com/bid/23916 http://www.securitytracker.com/id?1018045 http://www.vupen.com/english/advisories/2007/1732 https://exchange.xforce.ibmcloud.com/vulnerabilities/34221 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in Novell SecureLogin (NSL) 6 SP1 before 6.0.106 has unknown impact and remote attack vectors, related to Active Directory (AD) password changes. Vulnerabilidad no especificada en Novell SecureLogin (NSL) 6 SP1 anterior a 6.0.106 tiene impacto y vectores de ataque remotos desconocidos, relacionado con cambios de contraseña en el Directorio Activo. • http://osvdb.org/35775 http://secunia.com/advisories/25160 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5003822.html http://www.securityfocus.com/bid/23547 http://www.securitytracker.com/id?1018006 http://www.vupen.com/english/advisories/2007/1436 •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the ADSCHEMA utility in Novell SecureLogin (NSL) 6 SP1 before 6.0.106 has unknown impact and remote attack vectors, related to granting "users excess permissions to their own attributes." Vulnerabilidad no especificada en la utilidad ADSCHEMA en Novell SecureLogin (NSL) 6 SP1 anterior a 6.0.106 tiene un impacto desconocido y vectores de ataque remotos, relacionado con los “usuarios que exceden los permisos de sus propios atributos.” • http://osvdb.org/35774 http://secunia.com/advisories/25160 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5003822.html http://www.securityfocus.com/bid/23547 http://www.securitytracker.com/id?1018006 http://www.vupen.com/english/advisories/2007/1436 •

CVSS: 7.8EPSS: 3%CPEs: 3EXPL: 0

ncp in Novell eDirectory before 8.7.3 SP9, and 8.8.x before 8.8.1 FTF2, does not properly handle NCP fragments with a negative length, which allows remote attackers to cause a denial of service (daemon crash) when the heap is written to a log file. ncp en Novell eDirectory anterior a 8.7.3 SP9, y 8.8.x anterior a 8.8.1 FTF2, no maneja adecuadamente fragmentos NCP con una longitud negativa, lo cual permite a atacantes remotos provocar una denegación de servicio (caída del demonio) cuando el montón se escribe a un fichero de registro de eventos. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=518 http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3924657&sliceId=SAL_Public http://www.securityfocus.com/bid/23685 http://www.securitytracker.com/id?1017972 http://www.vupen.com/english/advisories/2007/1550 https://exchange.xforce.ibmcloud.com/vulnerabilities/33921 •