Filtered by vendor Novell
Subscriptions
Total
673 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2006-3425 | 2 Lumension, Novell | 2 Patchlink Update Server, Zenworks | 2025-04-03 | N/A |
FastPatch for (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1, and (b) Novell ZENworks 6.2 SR1 and earlier, does not require authentication for dagent/proxyreg.asp, which allows remote attackers to list, add, or delete PatchLink Distribution Point (PDP) proxy servers via modified (1) List, (2) Proxy, or (3) Delete parameters. | ||||
CVE-2004-2579 | 1 Novell | 1 Ichain | 2025-04-03 | N/A |
ACLCHECK module in Novell iChain 2.3 allows attackers to bypass access control rules of an unspecified component via an unspecified attack vector involving a string that contains escape sequences represented with "overlong UTF-8 encoding." | ||||
CVE-2002-1634 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
Novell NetWare 5.1 installs sample applications that allow remote attackers to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl. | ||||
CVE-2004-2757 | 1 Novell | 1 Ichain | 2025-04-03 | N/A |
Cross-site scripting (XSS) vulnerability in the failed login page in Novell iChain before 2.2 build 2.2.113 and 2.3 First Customer Ship (FCS) allows remote attackers to inject arbitrary web script or HTML via url parameter. | ||||
CVE-2006-0992 | 1 Novell | 1 Groupwise Messenger | 2025-04-03 | N/A |
Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier. | ||||
CVE-2005-0744 | 1 Novell | 1 Ichain | 2025-04-03 | N/A |
The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser. | ||||
CVE-2005-0746 | 1 Novell | 1 Ichain | 2025-04-03 | N/A |
The Mini FTP server in Novell iChain 2.2 and 2.3 SP2 and earlier allows remote unauthenticated attackers to obtain the full path of the server via the PWD command. | ||||
CVE-2005-0797 | 1 Novell | 1 Ichain | 2025-04-03 | N/A |
Novell iChain Mini FTP Server 2.3 displays different error messages if a user exists or not, which allows remote attackers to obtain sensitive information and facilitates brute force attacks. | ||||
CVE-2005-0798 | 1 Novell | 1 Ichain | 2025-04-03 | N/A |
Novell iChain Mini FTP Server 2.3, and possibly earlier versions, does not limit the number of incorrect logins, which makes it easier for remote attackers to conduct brute force login attacks. | ||||
CVE-2005-0819 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
The xvesa code in Novell Netware 6.5 SP2 and SP3 allows remote attackers to redirect the xsession without authentication via a direct request to GUIMirror/Start. | ||||
CVE-2005-1040 | 1 Novell | 1 Linux Desktop | 2025-04-03 | N/A |
Multiple unknown vulnerabilities in netapplet in Novell Linux Desktop 9 allow local users to gain root privileges, related to "User input [being] passed to network scripts without verification." | ||||
CVE-2005-1060 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
Unknown vulnerability in the TCP/IP functionality (TCPIP.NLM) in Novell Netware 6.x allows remote attackers to cause a denial of service (ABEND by Page Fault Processor Exception) via certain packets. | ||||
CVE-2005-1065 | 1 Novell | 1 Linux Desktop | 2025-04-03 | N/A |
tetex in Novell Linux Desktop 9 allows local users to determine the existence of arbitrary files via a symlink attack in the /var/cache/fonts directory. | ||||
CVE-2005-1247 | 1 Novell | 1 Nsure Audit | 2025-04-03 | N/A |
webadmin.exe in Novell Nsure Audit 1.0.1 allows remote attackers to cause a denial of service via malformed ASN.1 packets in corrupt client certificates to an SSL server, as demonstrated using an exploit for the OpenSSL ASN.1 parsing vulnerability. | ||||
CVE-2005-1729 | 1 Novell | 1 Edirectory | 2025-04-03 | N/A |
Novell eDirectory 8.7.3 allows remote attackers to cause a denial of service (application crash) via a URL containing an MS-DOS device name such as AUX, CON, PRN, COM1, or LPT1. | ||||
CVE-2005-1763 | 3 Novell, Redhat, Suse | 3 Linux Desktop, Enterprise Linux, Suse Linux | 2025-04-03 | N/A |
Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory. | ||||
CVE-2005-1757 | 1 Novell | 1 Netmail | 2025-04-03 | N/A |
Buffer overflow in the Modweb agent for Novell NetMail 3.52 before 3.52C, when renaming folders, may allow attackers to execute arbitrary code. | ||||
CVE-2005-1767 | 3 Novell, Redhat, Suse | 4 Linux Desktop, Open Enterprise Server, Enterprise Linux and 1 more | 2025-04-03 | N/A |
traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception). | ||||
CVE-2002-1772 | 1 Novell | 1 Netware | 2025-04-03 | N/A |
Novell Netware 5.0 through 5.1 may allow local users to gain "Domain Admin" rights by logging into a Novell Directory Services (NDS) account, and executing "net use" on an NDS_ADM account that is not in the NT domain but has domain access rights, which allows the user to enter a null password. | ||||
CVE-2005-2176 | 1 Novell | 1 Netmail | 2025-04-03 | N/A |
Novell NetMail automatically processes HTML in an attachment without prompting the user to save or open it, which makes it easier for remote attackers to conduct web-based attacks and steal cookies. |