Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell netware 5.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2351
Stack-based buffer overflow in the CIFS.NLM driver in Netware SMB 1.0 for Novell Netware 6.5 SP8 and previous versions allows remote malicious users to execute arbitrary code via a Sessions Setup AndX packet with a long AccountName.
Novell Netware 6.5
Novell Netware 6.0
Novell Netware 5.0
Novell Netware
Novell Netware 5.1
1 EDB exploit
NA
CVE-2002-1772
Novell Netware 5.0 up to and including 5.1 may allow local users to gain "Domain Admin" rights by logging into a Novell Directory Services (NDS) account, and executing "net use" on an NDS_ADM account that is not in the NT domain but has domain access rights, w...
Novell Netware 5.0
Novell Netware 5.1
NA
CVE-2002-1634
Novell NetWare 5.1 installs sample applications that allow remote malicious users to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl.
Novell Netware 5.0
Novell Netware 5.1
1 EDB exploit
NA
CVE-2000-0600
Netscape Enterprise Server in NetWare 5.1 allows remote malicious users to cause a denial of service or execute arbitrary commands via a malformed URL.
Netscape Enterprise Server 5.0
Netscape Enterprise Server 4.1.1
Novell Netware 5.0
Novell Netware 5.1
NA
CVE-2000-0669
Novell NetWare 5.0 allows remote malicious users to cause a denial of service by flooding port 40193 with random data.
Novell Netware 5.0
1 EDB exploit
NA
CVE-2000-0793
Norton AntiVirus 5.00.01C with the Novell Netware client does not properly restart the auto-protection service after the first user has logged off of the system.
Novell Client 3.1
Symantec Norton Antivirus 5.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started