CVE-2006-4803
https://notcve.org/view.php?id=CVE-2006-4803
The Fan-Out Linux and UNIX receiver scripts in Novell Identity Manager (IDM) 3.0.1 allows local users to execute arbitrary commands via unspecified vectors involving certain environment variables and "code injection." La secuencia de comandos del receptor de fan-out de linux y UNIX permite a un usuario local ejecutar comandos de su elección a través de vectores sin especificar que implican ciertas varibles de entorno e "inyecciòn de código". • http://secunia.com/advisories/21888 http://securitytracker.com/id?1016853 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974421.htm http://www.securityfocus.com/bid/20016 http://www.vupen.com/english/advisories/2006/3607 •
CVE-2006-4506
https://notcve.org/view.php?id=CVE-2006-4506
idmlib.sh in nxdrv in Novell Identity Manager (IDM) 3.0.1 allows local users to execute arbitrary commands via unspecified vectors, possibly involving the " (quote) and \ (backslash) characters and eval injection. idmlib.sh en nxdrv en Novell Identity Manager (IDM) 3.0.1 permite a usuarios locales ejecutar órdenes de su elección mediante vectores no especificados, posiblemente implicando los caractéres " (comillas) y \ (contrabarra) en una inyección de 'eval'. • http://securitytracker.com/id?1016741 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974299.htm http://www.securityfocus.com/bid/19688 •
CVE-2005-1244
https://notcve.org/view.php?id=CVE-2005-1244
Directory traversal vulnerability in the third party tool from NetIQ, as used to secure the iSeries AS/400 FTP server, allows remote attackers to access arbitrary files, including those from qsys.lib, via ".." sequences in a GET request. NOTE: the vendor has disputed this issue, saying that "neither NetIQ Security Manager nor our iSeries Security Solutions are vulnerable. • http://securitytracker.com/id?1013810 http://www.osvdb.org/15791 http://www.securityfocus.com/archive/1/396628 http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/20260 •