CVE-2007-4557
https://notcve.org/view.php?id=CVE-2007-4557
Cross-site scripting (XSS) vulnerability in the webacc servlet in Novell GroupWise 6.5 WebAccess allows remote attackers to inject arbitrary web script or HTML via the User.Id parameter, as demonstrated by a URL within a url field in a STYLE element, possibly due to an incomplete fix for CVE-2004-2103.2. Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en el servlet webacc en Novell GroupWise 6.5 WebAccess permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro User.Id, como se demostró con la URL con una campo de url en un elemento STYLE, posiblemente relacionado con una solución incompleta para CVE-2004-2103.2. • http://0x000000.com/index.php?i=409 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2007-4526
https://notcve.org/view.php?id=CVE-2007-4526
The Client Login Extension (CLE) in Novell Identity Manager before 3.5.1 20070730 stores the username and password in a local file, which allows local users to obtain sensitive information by reading this file. La Client Login Extension (CLE) de Novell Identity Manager versiones anteriores a 3.5.1 20070730 almacena nombre de usuario y contraseña en un fichero local, lo cual permite a usuarios locales obtener información confidencial leyendo este fichero. • http://osvdb.org/37320 http://secunia.com/advisories/26555 http://securitytracker.com/id?1018602 http://www.securityfocus.com/bid/25420 http://www.vupen.com/english/advisories/2007/2957 https://exchange.xforce.ibmcloud.com/vulnerabilities/36215 https://secure-support.novell.com/KanisaPlatform/Publishing/177/3329402_f.SAL_Public.html • CWE-255: Credentials Management Errors •
CVE-2007-4432
https://notcve.org/view.php?id=CVE-2007-4432
Untrusted search path vulnerability in the wrapper scripts for the (1) rug, (2) zen-updater, (3) zen-installer, and (4) zen-remover programs on SUSE Linux 10.1 and Enterprise 10 allows local users to gain privileges via modified (a) LD_LIBRARY_PATH and (b) MONO_GAC_PREFIX environment variables. Vulnerabilidad de búsqueda en ruta no confiable en las secuencias de comandos wrapper para los programas (1) rug, (2) zen-updater, (3) zen-installer, y (4) zen-remover sobre SUSE Linux 10.1 y Enterprise 10 permiten a usuarios locales ganar privilegios a través de modificaciones de variables de entorno (a) LD_LIBRARY_PATH y (b) MONO_GAC_PREFIX. • http://osvdb.org/46781 http://osvdb.org/46782 http://osvdb.org/46783 http://osvdb.org/46784 http://secunia.com/advisories/26543 http://www.novell.com/linux/security/advisories/2007_17_sr.html •
CVE-2007-4394
https://notcve.org/view.php?id=CVE-2007-4394
Unspecified vulnerability in a "core clean" cron job created by the findutils-locate package on SUSE Linux 10.0 and 10.1 and Enterprise Server 9 and 10 before 20070810 allows local users to delete of arbitrary files via unknown vectors. Vulnerabilidad no especificada en una tarea planificada (cron job) de "limpieza del núcleo" creada por el paquete findutils-locate en SUSE Linux 10.0 y 10.1 y Enterprise Server 9 y 10 anterior al 10/08/2007 permite a usuarios locales borrar archivos de su elección a través de vectores desconocidos. • http://osvdb.org/46404 http://secunia.com/advisories/26395 http://www.novell.com/linux/security/advisories/2007_16_sr.html •
CVE-2007-2954 – Novell Client NWSPOOL.DLL Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-2954
Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2 through SP4 for Windows allow remote attackers to execute arbitrary code via certain long arguments to the (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory, and other unspecified RPC requests, aka Novell bug 300870, a different vulnerability than CVE-2006-5854. Múltiples desbordamientos de búfer en la región stack de la memoria en el servicio Spooler (biblioteca nwspool.dll) en Novell Client versiones 4.91 desde SP2 hasta SP4 para Windows, permite a atacantes remotos ejecutar código arbitrario por medio de ciertos argumentos largos en peticiones RPC (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory y otras no especificadas, también se conoce como bug de Novell 300870, una vulnerabilidad diferente de CVE-2006-5854. This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the Novell Netware Client. Authentication is not required to exploit this vulnerability. The specific flaw exists in nwspool.dll which is responsible for handling RPC requests through the spoolss named pipe. Several RPC functions exposed by this DLL do not properly verify argument sizes and subsequently copy user-supplied data to a stack-based buffer resulting in an exploitable overflow. • http://download.novell.com/Download?buildid=VOXNZb-6t_g~ http://osvdb.org/37321 http://secunia.com/advisories/26374 http://secunia.com/secunia_research/2007-57/advisory http://securitytracker.com/id?1018623 http://www.securityfocus.com/bid/25474 http://www.vupen.com/english/advisories/2007/3006 http://www.zerodayinitiative.com/advisories/ZDI-07-045 https://exchange.xforce.ibmcloud.com/vulnerabilities/35824 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •