Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netware vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2351
Stack-based buffer overflow in the CIFS.NLM driver in Netware SMB 1.0 for Novell Netware 6.5 SP8 and previous versions allows remote malicious users to execute arbitrary code via a Sessions Setup AndX packet with a long AccountName.
Novell Netware 6.5
Novell Netware 6.0
Novell Netware 5.0
Novell Netware
Novell Netware 5.1
1 EDB exploit
NA
CVE-1999-1086
Novell 5 and previous versions, when running over IPX with a packet signature level less than 3, allows remote malicious users to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls.
Novell Netware
Novell Netware 4.1
Novell Netware 4.11
NA
CVE-2005-2852
Unknown vulnerability in CIFS.NLM in Novell Netware 6.5 SP2 and SP3, 5.1, and 6.0 allows remote malicious users to cause a denial of service (ABEND) via an incorrect password length, as exploited by the "worm.rbot.ccc" worm.
Novell Netware 6.5
Novell Netware 6.0
Novell Netware 5.1
1 EDB exploit
NA
CVE-2010-4228
Stack-based buffer overflow in NWFTPD.NLM prior to 5.10.02 in the FTP server in Novell NetWare allows remote authenticated users to execute arbitrary code or cause a denial of service (abend) via a long DELE command, a different vulnerability than CVE-2010-0625.4.
Novell Netware 5.1
Novell Netware 6.0
Novell Netware 6.5
1 EDB exploit
NA
CVE-2002-1754
Buffer overflow in Novell NetWare Client 4.80 up to and including 4.83 allows local users to cause a denial of service (crash) by using ping, traceroute, or a similar utility to force the client to resolve a large hostname.
Novell Netware Client 4.82
Novell Netware Client 4.83
Novell Netware Client 4.80
Novell Netware Client 4.81
NA
CVE-2006-1322
Novell Netware NWFTPD 5.06.05 allows remote malicious users to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow.
Novell Netware Ftp Server 5.07
Novell Netware Ftp Server
Novell Netware 6.5
9.8
CVSSv3
CVE-2009-5153
In Novell NetWare prior to 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated malicious users to execute code, because a length field was incorrectly trusted.
Microfocus Netware 6.5
Microfocus Netware
NA
CVE-2008-5696
Novell NetWare 6.5 before Support Pack 8, when an OES2 Linux server is installed into the NDS tree, does not require a password for the ApacheAdmin console, which allows remote malicious users to reconfigure the Apache HTTP Server via console operations.
Novell Netware 6.5
Novell Netware
NA
CVE-2010-4227
The xdrDecodeString function in XNFS.NLM in Novell Netware 6.5 before SP8 allows remote malicious users to cause a denial of service (abend) or execute arbitrary code via a crafted, signed value in a NFS RPC request to port UDP 1234, leading to a stack-based buffer overflow.
Novell Netware 6.5
Novell Netware
1 EDB exploit
NA
CVE-2002-1634
Novell NetWare 5.1 installs sample applications that allow remote malicious users to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl.
Novell Netware 5.0
Novell Netware 5.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »