Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell netware vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2021-36745
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote malicious user to bypass authentication on affected i...
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
10
CVSSv2
CVE-2010-4227
The xdrDecodeString function in XNFS.NLM in Novell Netware 6.5 before SP8 allows remote malicious users to cause a denial of service (abend) or execute arbitrary code via a crafted, signed value in a NFS RPC request to port UDP 1234, leading to a stack-based buffer overflow.
Novell Netware 6.5
Novell Netware
1 EDB exploit
10
CVSSv2
CVE-2010-2351
Stack-based buffer overflow in the CIFS.NLM driver in Netware SMB 1.0 for Novell Netware 6.5 SP8 and previous versions allows remote malicious users to execute arbitrary code via a Sessions Setup AndX packet with a long AccountName.
Novell Netware 6.5
Novell Netware 6.0
Novell Netware 5.0
Novell Netware
Novell Netware 5.1
1 EDB exploit
10
CVSSv2
CVE-2003-1595
NWFTPD.nlm prior to 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly perform "intruder detection," which has unspecified impact and attack vectors.
Novell Netware Ftp Server
Novell Netware 6.5
10
CVSSv2
CVE-2008-5038
Use-after-free vulnerability in the NetWare Core Protocol (NCP) feature in Novell eDirectory 8.7.3 SP10 prior to 8.7.3 SP10 FTF1 and 8.8 SP2 for Windows allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a sequence of "Get NCP ...
Novell Edirectory 8.7.3
Novell Edirectory
Novell Edirectory 8.8
10
CVSSv2
CVE-2008-4478
Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 prior to 8.8.3, and 8.73 prior to 8.7.3.10 ftf1, allow remote malicious users to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, whi...
Novell Edirectory 8.8.1
Novell Edirectory 8.8
Novell Edirectory 8.7.3.9
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.8
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.7.1
Novell Edirectory 8.7.3
Novell Edirectory
Novell Edirectory 8.7
10
CVSSv2
CVE-2008-4480
Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.x prior to 8.8.3, and 8.7.3 prior to 8.7.3.10 ftf1, allows remote malicious users to execute arbitrary code via a crafted Netware Core Protocol opcode 0x24 message that triggers a calculation error that under-allocate...
Novell Edirectory
10
CVSSv2
CVE-2004-2734
webadmin-apache.conf in Novell Web Manager of Novell NetWare 6.5 uses an uppercase Alias tag with an inconsistent lowercase directory tag for a volume, which allows remote malicious users to bypass access control to the WEB-INF folder.
Novell Netware 6.5
10
CVSSv2
CVE-2000-0793
Norton AntiVirus 5.00.01C with the Novell Netware client does not properly restart the auto-protection service after the first user has logged off of the system.
Novell Client 3.1
Symantec Norton Antivirus 5.0
10
CVSSv2
CVE-1999-1086
Novell 5 and previous versions, when running over IPX with a packet signature level less than 3, allows remote malicious users to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls.
Novell Netware
Novell Netware 4.1
Novell Netware 4.11
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »