CVE-2003-1150
- EPSS 2.28%
- Published 27.10.2003 05:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in the portmapper service (PMAP.NLM) in Novell NetWare 6 SP3 and ZenWorks for Desktops 3.2 SP2 through 4.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown attack vectors.
- EPSS 9.9%
- Published 27.08.2003 04:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 and 6.0 allows remote attackers to cause a denial of service (ABEND) via a long input string.
- EPSS 0.63%
- Published 11.04.2003 04:00:00
- Last modified 03.04.2025 01:03:51
The web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to obtain Perl version information via the -v option.
- EPSS 4.6%
- Published 11.04.2003 04:00:00
- Last modified 03.04.2025 01:03:51
Directory traversal vulnerability in the web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to read arbitrary files via an HTTP request containing "..%5c" (URL-encoded dot-dot backslash) sequences.
CVE-2002-1436
- EPSS 9.67%
- Published 11.04.2003 04:00:00
- Last modified 03.04.2025 01:03:51
The web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary Perl code via an HTTP POST request.
- EPSS 3.92%
- Published 11.04.2003 04:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in the interpreter for Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to cause a denial of service (ABEND) via a long module name.
- EPSS 13.55%
- Published 11.04.2003 04:00:00
- Last modified 03.04.2025 01:03:51
Directory traversal vulnerability in Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to read arbitrary files via a URL containing a "..%5c" sequence (modified dot-dot), ...
CVE-2002-1413
- EPSS 1.69%
- Published 11.04.2003 04:00:00
- Last modified 03.04.2025 01:03:51
RCONAG6 for Novell Netware SP2, while running RconJ in secure mode, allows remote attackers to bypass authentication using the RconJ "Secure IP" (SSL) option during a connection.
- EPSS 8.56%
- Published 31.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
Novell NetWare 5.1 installs sample applications that allow remote attackers to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl.
CVE-2002-1772
- EPSS 0.03%
- Published 31.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
Novell Netware 5.0 through 5.1 may allow local users to gain "Domain Admin" rights by logging into a Novell Directory Services (NDS) account, and executing "net use" on an NDS_ADM account that is not in the NT domain but has domain access rights, whi...