Page 2 of 9 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in the failed login page in Novell iChain before 2.2 build 2.2.113 and 2.3 First Customer Ship (FCS) allows remote attackers to inject arbitrary web script or HTML via url parameter. • http://secunia.com/advisories/10653 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10080762.htm http://www.securityfocus.com/bid/9412 https://exchange.xforce.ibmcloud.com/vulnerabilities/14873 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Novell iChain 2.2 before Support Pack 1 does not properly verify that URL redirects match the DNS name of an accelerator, which allows attackers to redirect URLs to malicious web sites. Novell iChain 2.2 anteriores a Support Pack 1 no verifica adecuadamente que las redirecciones de URL concuerdan con el nombre DNS de un acelerador, lo que permite a atacantes redirigir URLs a sitios maliciosos. • http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability or vulnerabilities in Novell iChain 2.2 before Support Pack 1, with unknown impact, possibly related to unauthorized access to (1) NCPIP.NLM and (2) JSTCP.NLM. Vulnerabilidad o vulnerabilidades desconocidas en Novell iChain 2.2 anteriores a Support Pack 1, con impacto desconocido, posiblemente relacionadas con acceso no autorizado a NCPIP.NLM y JSTCP.NLM. • http://marc.info/?l=bugtraq&m=105492852131747&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Novell iChain 2.2 before Support Pack 1 uses a shorter timeout for a non-existent user than a valid user, which makes it easier for remote attackers to guess usernames and conduct brute force password guessing. • http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm • CWE-203: Observable Discrepancy •