CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1371 | CVE-1999-1391 | Candidate | Vulnerability in NeXT 1.0a and 1.0 with publicly accessible printers allows local users to gain privileges via a combination of the npd program and weak directory permissions. | Modified (20020218-01) | ACCEPT(3) Cole, Foat, Stracener | MODIFY(1) Frech | NOOP(1) Wall | Frech> XF:nextstep-npd-root-access(7143) | View |
2391 | CVE-2000-0817 | Candidate | Buffer overflow in the HTTP protocol parser for Microsoft Network Monitor (Netmon) allows remote attackers to execute arbitrary commands via malformed data, aka the "Netmon Protocol Parsing" vulnerability. | Modified (20010119-01) | ACCEPT(3) Baker, Cole, Mell | MODIFY(1) Frech | NOOP(1) Renaud | Frech> XF:network-monitor-bo(5399) | View |
2454 | CVE-2000-0885 | Candidate | Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing" vulnerability. NOTE: It is highly likely that this candidate will be split into multiple candidates. | Modified (20010119-01) | ACCEPT(4) Baker, Cole, Mell, Renaud | MODIFY(1) Frech | Frech> XF:network-monitor-bo(5399) | View |
4715 | CVE-2002-0323 | Candidate | comment2.jse in ScriptEase:WebServer allows remote attackers to read arbitrary files by specifying the target file as an argument in the URL. | Proposed (20020502) | MODIFY(1) Frech | NOOP(5) Christey, Cole, Cox, Foat, Wall | Frech> XF:netware-webserver-directory-traversal(7726) | Christey> Need to investigate why some information sources are combining | this with a Novell web server viewcode.asp issue (e.g. the ISS | reference). | | Consider BID:3715 | View |
1066 | CVE-1999-1086 | Candidate | Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. | Proposed (20010912) | ACCEPT(1) Cole | MODIFY(1) Frech | NOOP(2) Foat, Wall | Frech> XF:netware-ipx-session-spoof(2350) | View |
Page 124 of 20943, showing 5 records out of 104715 total, starting on record 616, ending on 620