Filtered by vendor Novell
Subscriptions
Filtered by product Netware
Subscriptions
Total
76 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2004-2105 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
The webacc servlet in Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to read arbitrary .htt files via a full pathname in the error parameter. | ||||
CVE-2004-2106 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to list directories via a direct request to (1) /com/, (2) /com/novell/, (3) /com/novell/webaccess, or (4) /ns-icons/. | ||||
CVE-1999-0265 | 2 Microware, Novell | 2 Os-9, Netware | 2025-04-03 | N/A |
ICMP redirect messages may crash or lock up a host. | ||||
CVE-2005-0819 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
The xvesa code in Novell Netware 6.5 SP2 and SP3 allows remote attackers to redirect the xsession without authentication via a direct request to GUIMirror/Start. | ||||
CVE-2006-0997 | 1 Novell | 2 Netware, Open Enterprise Server | 2025-04-03 | N/A |
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) permits encryption with a NULL key, which results in cleartext communication that allows remote attackers to read an SSL protected session by sniffing network traffic. | ||||
CVE-2006-0998 | 1 Novell | 2 Netware, Open Enterprise Server | 2025-04-03 | N/A |
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) sometimes selects a weak cipher instead of an available stronger cipher, which makes it easier for remote attackers to sniff and decrypt an SSL protected session. | ||||
CVE-2006-1322 | 1 Novell | 2 Netware, Netware Ftp Server | 2025-04-03 | N/A |
Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow. | ||||
CVE-2001-1233 | 1 Novell | 2 Groupwise Webaccess, Netware | 2025-04-03 | N/A |
Netware Enterprise Web Server 5.1 running GroupWise WebAccess 5.5 with Novell Directory Services (NDS) enabled allows remote attackers to enumerate user names, group names and other system information by accessing ndsobj.nlm. | ||||
CVE-2000-0257 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
Buffer overflow in the NetWare remote web administration utility allows remote attackers to cause a denial of service or execute commands via a long URL. | ||||
CVE-1999-0470 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted. | ||||
CVE-1999-1382 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
NetWare NFS mode 1 and 2 implements the "Read Only" flag in Unix by changing the ownership of a file to root, which allows local users to gain root privileges by creating a setuid program and setting it to "Read Only," which NetWare-NFS changes to a setuid root program. | ||||
CVE-1999-1020 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
The installation of Novell Netware NDS 5.99 provides an unauthenticated client with Read access for the tree, which allows remote attackers to access sensitive information such as users, groups, and readable objects via CX.EXE and NLIST.EXE. | ||||
CVE-1999-1086 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. | ||||
CVE-2000-0600 | 2 Netscape, Novell | 2 Enterprise Server, Netware | 2025-04-03 | N/A |
Netscape Enterprise Server in NetWare 5.1 allows remote attackers to cause a denial of service or execute arbitrary commands via a malformed URL. | ||||
CVE-2002-1417 | 1 Novell | 2 Netware, Small Business Suite | 2025-04-03 | N/A |
Directory traversal vulnerability in Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to read arbitrary files via a URL containing a "..%5c" sequence (modified dot-dot), which is mapped to the directory separator. | ||||
CVE-2021-25252 | 7 Apple, Emc, Linux and 4 more | 25 Macos, Celerra Network Attached Storage, Linux Kernel and 22 more | 2024-11-21 | 5.5 Medium |
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file. |