cpe:2.3:o:novell:netware:5.1:sp2a:*:*:*:*:*:*
Stack-based buffer overflow in NWFTPD.NLM before 5.10.02 in the FTP server in Novell NetWare allows remote authenticated users to execute arbitrary code or cause a denial of service (abend) via a long DELE command, a different vulnerability than CVE-2010-0625.4.
Max CVSS
9.0
EPSS Score
92.13%
Published
2011-03-22
Updated
2017-08-17
Stack-based buffer overflow in the CIFS.NLM driver in Netware SMB 1.0 for Novell Netware 6.5 SP8 and earlier allows remote attackers to execute arbitrary code via a Sessions Setup AndX packet with a long AccountName.
Max CVSS
10.0
EPSS Score
45.07%
Published
2010-06-21
Updated
2018-10-30
NWFTPD.nlm before 5.03.12 in the FTP server in Novell NetWare does not properly restrict filesystem use by anonymous users with NFS Gateway home directories, which allows remote attackers to bypass intended access restrictions via an FTP session.
Max CVSS
7.5
EPSS Score
0.28%
Published
2010-04-05
Updated
2010-06-08
Buffer overflow in Novell Remote Manager module, httpstk.nlm, in NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary code via a long (1) username or (2) password.
Max CVSS
7.5
EPSS Score
2.40%
Published
2002-12-31
Updated
2008-09-05
The web handler for Perl 5.003 on Novell NetWare 5.1 and NetWare 6 allows remote attackers to execute arbitrary Perl code via an HTTP POST request.
Max CVSS
7.5
EPSS Score
7.57%
Published
2003-04-11
Updated
2008-09-05
Netscape Enterprise Server in NetWare 5.1 allows remote attackers to cause a denial of service or execute arbitrary commands via a malformed URL.
Max CVSS
7.5
EPSS Score
0.29%
Published
2000-06-26
Updated
2017-10-10
Buffer overflow in the NetWare remote web administration utility allows remote attackers to cause a denial of service or execute commands via a long URL.
Max CVSS
7.5
EPSS Score
1.15%
Published
2000-04-19
Updated
2008-09-10
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!