First published: Tue Dec 31 2002(Updated: )
Novell NetWare 5.1 installs sample applications that allow remote attackers to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell NetWare | =5.1 | |
Novell NetWare | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1634 is classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2002-1634, it is recommended to remove or disable the sample applications mentioned in the vulnerability description.
CVE-2002-1634 affects Novell NetWare versions 5.0 and 5.1.
CVE-2002-1634 can allow attackers to obtain various types of sensitive information through specific vulnerable applications.
CVE-2002-1634 is known among legacy vulnerabilities of Novell NetWare, which can still pose risks if the software is in use.