Page 11 of 56 results (0.011 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The MKDQUOTESAFE function in the Fan-out driver scripts in Fan-Out Platform Services in Novell Identity Manager (aka IDM) 4.0.2 allows local users to execute arbitrary commands by leveraging eDirectory POSIX attribute changes to insert shell metacharacters. La función MKDQUOTESAFE en la secuencias de comandos del controlador Fan-out en Fan-Out Platform Services en Novell Identity Manager (también conocido como IDM) 4.0.2 permite a usuarios locales ejecutar comandos arbitrarios mediante el aprovechamiento de cambios de atributos de eDirectory POSIX para insertar metacaracteres de shell. • http://download.novell.com/Download?buildid=5XLmBl54_Rg~ http://www.securityfocus.com/bid/68139 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The engine installer in Novell Identity Manager (aka IDM) 3.6.1 stores admin tree credentials in /tmp/idmInstall.log, which allows local users to obtain sensitive information by reading this file. El motor de instalación en Novell Identity Manager (también conocido como IDM) v3.6.1 almacena las credenciales del árbol de administrador en p/idmInstall.log, lo que permite a usuarios locales obtener información mediante la lectura de este archivo. • http://secunia.com/advisories/41194 http://www.novell.com/support/viewContent.do?externalId=7006705 http://www.vupen.com/english/advisories/2010/2226 • CWE-255: Credentials Management Errors •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 0

The Platform Service Process (asampsp) in Fan-Out Driver Platform Services for Novell Identity Manager (IDM) 3.5.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified network traffic that triggers a syslog message containing invalid format string specifiers, as demonstrated by a Nessus scan. El Platform Service Process (asampsp) de Fan-Out Driver Platform Services para Novell Identity Manager (IDM) 3.5.1 permite a atacantes remotos provocar una denegación de servicio (caída de demonio) mediante tráfico de red no especificado que dispara un mensaje de syslog conteniendo especificadores de formato de cadena inválidos, como se demuestra con un análisis Nessus. • http://osvdb.org/40104 http://secunia.com/advisories/28237 http://securitytracker.com/id?1019144 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5007560.html http://www.securityfocus.com/bid/27028 http://www.vupen.com/english/advisories/2007/4311 https://exchange.xforce.ibmcloud.com/vulnerabilities/39206 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

The Client Login Extension (CLE) in Novell Identity Manager before 3.5.1 20070730 stores the username and password in a local file, which allows local users to obtain sensitive information by reading this file. La Client Login Extension (CLE) de Novell Identity Manager versiones anteriores a 3.5.1 20070730 almacena nombre de usuario y contraseña en un fichero local, lo cual permite a usuarios locales obtener información confidencial leyendo este fichero. • http://osvdb.org/37320 http://secunia.com/advisories/26555 http://securitytracker.com/id?1018602 http://www.securityfocus.com/bid/25420 http://www.vupen.com/english/advisories/2007/2957 https://exchange.xforce.ibmcloud.com/vulnerabilities/36215 https://secure-support.novell.com/KanisaPlatform/Publishing/177/3329402_f.SAL_Public.html • CWE-255: Credentials Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The Fan-Out Linux and UNIX receiver scripts in Novell Identity Manager (IDM) 3.0.1 allows local users to execute arbitrary commands via unspecified vectors involving certain environment variables and "code injection." La secuencia de comandos del receptor de fan-out de linux y UNIX permite a un usuario local ejecutar comandos de su elección a través de vectores sin especificar que implican ciertas varibles de entorno e "inyecciòn de código". • http://secunia.com/advisories/21888 http://securitytracker.com/id?1016853 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974421.htm http://www.securityfocus.com/bid/20016 http://www.vupen.com/english/advisories/2006/3607 •