CVE-2011-5028 – novell sentinel log manager 1.2.0.1 - Directory Traversal
https://notcve.org/view.php?id=CVE-2011-5028
Directory traversal vulnerability in novelllogmanager/FileDownload in Novell Sentinel Log Manager 1.2.0.1_938 and earlier, as used in Novell Sentinel before 7.0.1.0, allows remote authenticated users to read arbitrary files via a .. (dot dot) in the filename parameter. Una vulnerabilidad de salto de directorio en novelllogmanager/FileDownload en Novell Sentinel Log Manager versión 1.2.0.1_938 y anteriores, como es usado en Novell Sentinel anterior a versión 7.0.1.0, permite a los usuarios autenticados remotos leer archivos arbitrarios por medio de .. (punto punto) en el parámetro filename. • https://www.exploit-db.com/exploits/21082 http://archives.neohapsis.com/archives/fulldisclosure/2011-12/0368.html http://osvdb.org/77948 http://secunia.com/advisories/47258 http://secunia.com/advisories/48760 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5138757.html http://www.securitytracker.com/id?1026437 https://exchange.xforce.ibmcloud.com/vulnerabilities/71861 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2011-3179
https://notcve.org/view.php?id=CVE-2011-3179
The server process in Novell Messenger 2.1 and 2.2.x before 2.2.1, and Novell GroupWise Messenger 2.04 and earlier, allows remote attackers to read from arbitrary memory locations via a crafted command. El proceso server en Novell Messenger v2.1 y v2.2.x antes de v2.2.1 y GroupWise Messenger v2.04 y anteriores permite a atacantes remotos leer direcciones de memoria de su elección a través de comandos modificados. • http://www.novell.com/support/viewContent.do?externalId=7009634 https://bugzilla.novell.com/show_bug.cgi?id=712158 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-2653 – Novell ZENworks Asset Management Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-2653
Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file. Vulnerabilidad de salto de directorio en el componente rtrlet en Novell ZENworks Asset Management (ZAM) v7.5, permite a atacantes remotos ejecutar comandos de su elección subiendo un archivo ejecutable. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Asset Management. Authentication is not required to exploit this vulnerability. The flaw exists within the rtrlet component. This process listens on TCP port 8080. • https://www.exploit-db.com/exploits/20502 http://download.novell.com/Download?buildid=hPvHtXeNmCU~ http://zerodayinitiative.com/advisories/ZDI-11-342 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2011-4191 – Novell Netware - XNFS caller_name xdrDecodeString Remote Code Execution
https://notcve.org/view.php?id=CVE-2011-4191
Stack-based buffer overflow in the xdrDecodeString function in XNFS.NLM in Novell NetWare 6.5 SP8 allows remote attackers to execute arbitrary code or cause a denial of service (abend or NFS outage) via long packets. Desbordamiento de búfer basado en la pila en la función xdrDecodeString en XNFS.NLM en Novell NetWare v6.5 SP8 permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (abend o interrupción NFS) a través de paquetes largos. • https://www.exploit-db.com/exploits/18351 https://www.exploit-db.com/exploits/18327 https://www.exploit-db.com/exploits/18328 http://download.novell.com/Download?buildid=Cfw1tDezgbw~ https://bugzilla.novell.com/show_bug.cgi?id=671020 https://bugzilla.novell.com/show_bug.cgi?id=702491 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-2657 – Novell Zenworks Software Packaging LaunchHelp.dll ActiveX Control LaunchProcess Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-2657
Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument. Una vulnerabilidad de salto de directorio en la función LaunchProcess en el control ActiveX LaunchHelp.HelpLauncher.1 en LaunchHelp.dll en AdminStudio en Novell ZENworks Configuration Management (ZCM) v10.2, v10.3, 11 y SP1 permite a atacantes remotos ejecutar comandos de su elección a través de una ruta en el primer argumento. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Software Packaging. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the function LaunchProcess exposed via the LaunchHelp.dll ActiveX Control (ProgID LaunchHelp.HelpLauncher.1). The first argument to LaunchProcess is a path to a command to execute, but the argument is not sanitized and is subject to directory traversal. • https://www.exploit-db.com/exploits/19718 http://www.exploit-db.com/exploits/19718 http://www.novell.com/support/kb/doc.php?id=7009570 http://www.zerodayinitiative.com/advisories/ZDI-11-318 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •