9 results (0.011 seconds)

CVSS: 9.8EPSS: 15%CPEs: 8EXPL: 0

21 Nov 2018 — In Novell NetWare before 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated attackers to execute code, because a length field was incorrectly trusted. En Novell NetWare en versiones anteriores a la 6.5 SP8, un desbordamiento de búfer basado en pila durante el procesamiento de llamadas CALLIT RPC en el demonio NFS Portmapper en PKERNEL.NLM permitía que atacantes remotos no autenticados ejecutasen código, debido a que s... • https://bugzilla.suse.com/show_bug.cgi?id=515804 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 51%CPEs: 8EXPL: 4

18 Feb 2011 — The xdrDecodeString function in XNFS.NLM in Novell Netware 6.5 before SP8 allows remote attackers to cause a denial of service (abend) or execute arbitrary code via a crafted, signed value in a NFS RPC request to port UDP 1234, leading to a stack-based buffer overflow. La función xdrDecodeString en XNFS.NLM en Novell Netware v6.5 anterior a SP8 permite a atacantes remotos provocar una denegación de servicio o ejecutar código arbitrario a través de un valor firmado manipulado en una peticion RPC NFS para el ... • https://www.exploit-db.com/exploits/16234 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 17%CPEs: 20EXPL: 4

21 Jun 2010 — Stack-based buffer overflow in the CIFS.NLM driver in Netware SMB 1.0 for Novell Netware 6.5 SP8 and earlier allows remote attackers to execute arbitrary code via a Sessions Setup AndX packet with a long AccountName. Desbordamiento de búfer basado en pila en el controlador CIFS.NLM de Netware SMB v1.0 de Novell Netware v6.5 SP8 y anteriores. Permite a atacantes remotos ejecutar código de su elección a través de un paquete Sessions Setup AndX con un AccountName extenso. • https://www.exploit-db.com/exploits/13906 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 2%CPEs: 10EXPL: 0

19 Dec 2008 — Novell NetWare 6.5 before Support Pack 8, when an OES2 Linux server is installed into the NDS tree, does not require a password for the ApacheAdmin console, which allows remote attackers to reconfigure the Apache HTTP Server via console operations. Novell NetWare 6.5, en versiones anteriores al Support Pack 8, cuando un servidor Linux OES2 se instala en el árbol NDS, no requiere una contraseña para la consola ApacheAdmin, lo que permite a atacantes remotos reconfigurar el Servidor HTTP Apache a través de op... • http://secunia.com/advisories/32989 • CWE-255: Credentials Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

14 Feb 2001 — Novell NetWare Transaction Tracking System (TTS) in Novell 4.11 and earlier allows remote attackers to cause a denial of service via a large number of requests. • http://archives.neohapsis.com/archives/bugtraq/1999_2/0439.html •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 1

15 Jul 1999 — Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. • http://marc.info/?l=bugtraq&m=93214475111651&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

16 Jun 1999 — Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0929 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

18 Sep 1998 — The installation of Novell Netware NDS 5.99 provides an unauthenticated client with Read access for the tree, which allows remote attackers to access sensitive information such as users, groups, and readable objects via CX.EXE and NLIST.EXE. • https://www.exploit-db.com/exploits/19365 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

16 Sep 1993 — LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges. • http://ciac.llnl.gov/ciac/bulletins/d-21.shtml •