Page 2 of 8 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

ACLCHECK module in Novell iChain 2.3 allows attackers to bypass access control rules of an unspecified component via an unspecified attack vector involving a string that contains escape sequences represented with "overlong UTF-8 encoding." • http://secunia.com/advisories/12366 http://securitytracker.com/id?1011074 http://support.novell.com/cgi-bin/search/searchtid.cgi?2972080.htm http://www.osvdb.org/9266 http://www.securityfocus.com/bid/11061 https://exchange.xforce.ibmcloud.com/vulnerabilities/17132 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Novell iChain 2.3 allows attackers to cause a denial of service via a URL with a "specific string." • http://secunia.com/advisories/12366 http://securitytracker.com/id?1011074 http://support.novell.com/cgi-bin/search/searchtid.cgi?2972080.htm http://www.osvdb.org/9268 http://www.securityfocus.com/bid/11061 https://exchange.xforce.ibmcloud.com/vulnerabilities/17134 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Novell iChain 2.3 includes the build number in the VIA line of the proxy server's HTTP headers, which allows remote attackers to obtain sensitive information. • http://secunia.com/advisories/12366 http://securitytracker.com/id?1011074 http://support.novell.com/cgi-bin/search/searchtid.cgi?2972080.htm http://www.osvdb.org/9269 http://www.securityfocus.com/bid/11061 https://exchange.xforce.ibmcloud.com/vulnerabilities/17135 •