Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2006-2304
Multiple integer overflows in the DPRPC library (DPRPCW32.DLL) in Novell Client 4.83 SP3, 4.90 SP2 and 4.91 SP2 allow remote malicious users to execute arbitrary code via an XDR encoded array with a field that specifies a large number of elements, which triggers the overflows in ...
Novell Client 4.83
Novell Client 4.90
Novell Client 4.91
10
CVSSv2
CVE-2006-0992
Stack-based buffer overflow in Novell GroupWise Messenger prior to 2.0 Public Beta 2 allows remote malicious users to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2...
Novell Groupwise Messenger 2.0
1 EDB exploit
10
CVSSv2
CVE-2006-0736
Stack-based buffer overflow in the pam_micasa PAM authentication module in CASA on Novell Linux Desktop 9 and Open Enterprise Server 1 allows remote malicious users to execute arbitrary code via unspecified vectors.
Novell Open Enterprise Server 1
Novell Linux Desktop 9
10
CVSSv2
CVE-2005-0744
The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows malicious users to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authenticatio...
Novell Ichain 2.2
Novell Ichain 2.3
10
CVSSv2
CVE-2004-2734
webadmin-apache.conf in Novell Web Manager of Novell NetWare 6.5 uses an uppercase Alias tag with an inconsistent lowercase directory tag for a volume, which allows remote malicious users to bypass access control to the WEB-INF folder.
Novell Netware 6.5
10
CVSSv2
CVE-2003-1551
Unspecified vulnerability in Novell GroupWise 6 SP3 WebAccess before Revision F has unknown impact and attack vectors related to "malicious script."
Novell Groupwise
10
CVSSv2
CVE-2000-0793
Norton AntiVirus 5.00.01C with the Novell Netware client does not properly restart the auto-protection service after the first user has logged off of the system.
Novell Client 3.1
Symantec Norton Antivirus 5.0
10
CVSSv2
CVE-1999-1086
Novell 5 and previous versions, when running over IPX with a packet signature level less than 3, allows remote malicious users to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls.
Novell Netware
Novell Netware 4.1
Novell Netware 4.11
9.3
CVSSv2
CVE-2010-4314
Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client prior to 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the "name" parameter.
Novell Iprint
9.3
CVSSv2
CVE-2014-4619
EMC RSA Identity Management and Governance (IMG) 6.5.x prior to 6.5.1 P11, 6.5.2 before P02HF01, and 6.8.x prior to 6.8.1 P07, when Novell Identity Manager (aka NovellIM) is used, allows remote malicious users to bypass authentication via an arbitrary valid username.
Emc Rsa Identity Management And Governance 6.5.0
Emc Rsa Identity Management And Governance 6.5.1
Emc Rsa Identity Management And Governance 6.8.1
Emc Rsa Identity Management And Governance 6.5.2
Emc Rsa Identity Management And Governance 6.8.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »