Page 2 of 11 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in the failed login page in Novell iChain before 2.2 build 2.2.113 and 2.3 First Customer Ship (FCS) allows remote attackers to inject arbitrary web script or HTML via url parameter. • http://secunia.com/advisories/10653 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10080762.htm http://www.securityfocus.com/bid/9412 https://exchange.xforce.ibmcloud.com/vulnerabilities/14873 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Novell iChain 2.2 before Support Pack 1 does not properly verify that URL redirects match the DNS name of an accelerator, which allows attackers to redirect URLs to malicious web sites. Novell iChain 2.2 anteriores a Support Pack 1 no verifica adecuadamente que las redirecciones de URL concuerdan con el nombre DNS de un acelerador, lo que permite a atacantes redirigir URLs a sitios maliciosos. • http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in Novell iChain 2.2 before Support Pack 1 allows users to access restricted or secure pages without authentication. Vulnerabilidad desconocida en Novell iChain 2.2 anteriores a Support Pack 1 permite a usuarios acceder a páginas restringidas o seguras sin autenticación. • http://marc.info/?l=bugtraq&m=105492852131747&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability or vulnerabilities in Novell iChain 2.2 before Support Pack 1, with unknown impact, possibly related to unauthorized access to (1) NCPIP.NLM and (2) JSTCP.NLM. Vulnerabilidad o vulnerabilidades desconocidas en Novell iChain 2.2 anteriores a Support Pack 1, con impacto desconocido, posiblemente relacionadas con acceso no autorizado a NCPIP.NLM y JSTCP.NLM. • http://marc.info/?l=bugtraq&m=105492852131747&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Multiple buffer overflows in Novell iChain 2.1 before Field Patch 3, and iChain 2.2 before Field Patch 1a, allow attackers to cause a denial of service (ABEND) and possibly execute arbitrary code via (1) a long user name or (2) an unknown attack related to a "special script against login." Múltiples desbordamientos de búfer en Novell iChain 2.1 anteriores a Field Patch 3, e iChain 2.2 anteriores a Field Patch 1a, permite a atacantes causar una denegación de servicio (ABEND) y posiblemente ejecutar código arbitrario mediante (1) un nombre de usuario largo o (2) un ataque desconocido relacionado con un "script especial contra inicio de sesión". • http://marc.info/?l=bugtraq&m=105492847631711&w=2 http://marc.info/?l=bugtraq&m=105492852131747&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm •