Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell netware vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-0997
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) permits encryption with a NULL key, which results in cleartext communication that allows remote malicious users to read an SSL protected session by sniffing network traffic.
Novell Open Enterprise Server
Novell Netware 6.5
NA
CVE-2006-0998
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) sometimes selects a weak cipher instead of an available stronger cipher, which makes it easier for remote malicious users to sniff and decrypt an SSL protected session.
Novell Open Enterprise Server
Novell Netware 6.5
NA
CVE-2006-0999
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) allows a client to force the server to use weak encryption by stating that a weak cipher is required for client compatibility, which might allow remote malicious users to decry...
Novell Open Enterprise Server
Novell Netware 6.5
NA
CVE-2001-1233
Netware Enterprise Web Server 5.1 running GroupWise WebAccess 5.5 with Novell Directory Services (NDS) enabled allows remote malicious users to enumerate user names, group names and other system information by accessing ndsobj.nlm.
Novell Groupwise Webaccess 5.5
Novell Netware 5.1
NA
CVE-2010-0625
Stack-based buffer overflow in NWFTPD.nlm prior to 5.10.01 in the FTP server in Novell NetWare 5.1 up to and including 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, o...
Novell Netware Ftp Server 5.01i
Novell Netware Ftp Server 5.02y
Novell Netware Ftp Server 5.03b
Novell Netware Ftp Server 5.05.04
Novell Netware Ftp Server 5.06.04
Novell Netware Ftp Server 5.06.05
Novell Netware Ftp Server 5.01o
Novell Netware Ftp Server 5.01w
Novell Netware Ftp Server 5.03l
Novell Netware Ftp Server 5.04.20
Novell Netware Ftp Server 5.07
Novell Netware Ftp Server 5.07.02
Novell Netware Ftp Server 5.02i
Novell Netware Ftp Server 5.02r
Novell Netware Ftp Server 5.04.8
Novell Netware Ftp Server 5.05
Novell Netware Ftp Server 5.01y
Novell Netware Ftp Server 5.02b
Novell Netware Ftp Server 5.04.25
Novell Netware Ftp Server 5.04.5
Novell Netware 5.1
Novell Netware 6.5
NA
CVE-2006-6675
Cross-site scripting (XSS) vulnerability in Novell NetWare 6.5 Support Pack 5 and 6 and Novell Apache on NetWare 2.0.48 allows remote malicious users to inject arbitrary web script or HTML via unspecified parameters in Welcome web-app.
Novell Apache Http Server 2.0.48
Novell Netware 6.5
NA
CVE-2006-5854
Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 up to and including 4.91 SP2 allow remote malicious users to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Novell Netware Client 4.91
2 EDB exploits
NA
CVE-2007-5762
NICM.SYS driver 3.0.0.4, as used in Novell NetWare Client 4.91 SP4, allows local users to execute arbitrary code by opening the \\.\nicm device and providing crafted kernel addresses via IOCTLs with the METHOD_NEITHER buffering mode.
Novell Netware Client 4.91
1 EDB exploit
NA
CVE-2003-1150
Buffer overflow in the portmapper service (PMAP.NLM) in Novell NetWare 6 SP3 and ZenWorks for Desktops 3.2 SP2 up to and including 4.0.1 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via unknown attack vectors.
Novell Zenworks Desktops 4.0
Novell Zenworks Desktops 4.0.1
Novell Zenworks Desktops 3.2
Novell Netware 6.0
NA
CVE-1999-0265
ICMP redirect messages may crash or lock up a host.
Microware Os-9
Novell Netware 3.12
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »