Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell netware - vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2008-4478
Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 prior to 8.8.3, and 8.73 prior to 8.7.3.10 ftf1, allow remote malicious users to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, whi...
Novell Edirectory 8.7.3.9
Novell Edirectory 8.7
Novell Edirectory 8.8
Novell Edirectory 8.8.1
Novell Edirectory 8.7.3
Novell Edirectory 8.8.2
Novell Edirectory 8.7.3.8 Presp9
Novell Edirectory 8.7.1
Novell Edirectory 8.7.3.8
Novell Edirectory
445
VMScore
CVE-2008-1701
Novell NetWare 6.5 allows malicious users to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request.
Novell Iprint 6.5
725
VMScore
CVE-2007-5762
NICM.SYS driver 3.0.0.4, as used in Novell NetWare Client 4.91 SP4, allows local users to execute arbitrary code by opening the \\.\nicm device and providing crafted kernel addresses via IOCTLs with the METHOD_NEITHER buffering mode.
Novell Netware Client 4.91
1 EDB exploit
383
VMScore
CVE-2007-3571
The Apache Web Server as used in Novell NetWare 6.5 and GroupWise allows remote malicious users to obtain sensitive information via a certain directive to Apache that causes the HTTP-Header response to be modified, which may reveal the server's internal IP address.
Novell Groupwise 6.0
Novell Groupwise 6.0.1
Novell Groupwise 6.5
Novell Groupwise 6.5.2
Novell Groupwise 6.5.3
Novell Groupwise 6.5.4
Novell Groupwise 7.0
632
VMScore
CVE-2007-3207
Buffer overflow in the NFS mount daemon (XNFS.NLM) in Novell NetWare 6.5 SP6, and probably earlier, allows remote malicious users to cause a denial of service (abend) via a long path in a mount request.
Novell Client 6.5 Sp6
436
VMScore
CVE-2007-3200
NMASINST in Novell Modular Authentication Service (NMAS) 3.1.2 and previous versions on NetWare logs its invoking command line to NMASINST.LOG, which might allow local users to obtain the admin username and password by reading this file.
Novell Modular Authentication Service
828
VMScore
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote malicious users to execute arbitrary code via a malformed UPX compressed executable.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Pc Cillin - Internet Security 2006
Trend Micro Interscan Viruswall 3.7.0
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Interscan Viruswall For Windows Nt 3.6
Trend Micro Officescan Corporate 3.0
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.81
Trend Micro Portalprotect 1.2
Trend Micro Interscan Viruswall Gold
Trend Micro Officescan Corporate 7.0
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Serverprotect 5.5.8
Trend Micro Control Manager 2.5.0
Trend Micro Interscan Viruswall 3.7.0 Build1190
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Interscan Viruswall 3.8.0 Build1130
605
VMScore
CVE-2006-6675
Cross-site scripting (XSS) vulnerability in Novell NetWare 6.5 Support Pack 5 and 6 and Novell Apache on NetWare 2.0.48 allows remote malicious users to inject arbitrary web script or HTML via unspecified parameters in Welcome web-app.
Novell Apache Http Server 2.0.48
Novell Netware 6.5
760
VMScore
CVE-2006-5854
Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 up to and including 4.91 SP2 allow remote malicious users to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Novell Netware Client 4.91
2 EDB exploits
NA
CVE-2006-6114
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-5854. Reason: This candidate is a duplicate of CVE-2006-5854. Notes: All CVE users should reference CVE-2006-5854 instead of this candidate. All references and descriptions in this candidate have been removed...
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »