4 results (0.014 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

In NetIQ Sentinel before 8.1.x, a Sentinel user is logged into the Sentinel Web Interface. After performing some tasks within Sentinel the user does not log out but does go idle for a period of time. This in turn causes the interface to timeout so that it requires the user to re-authenticate. If another user is passing by and decides to login, their credentials are accepted. While The user does not inherit any of the other users privileges, they are able to view the previous screen. • https://www.netiq.com/support/kb/doc.php?id=7022706 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in NetIQ Sentinel Server 8.0 before 8.0.1 that may allow leakage of information (account enumeration). Se descubrió una vulnerabilidad en NetIQ Sentinel Server 8.0 en versiones anteriores a 8.0.1 que pueden permitir la fuga de información (enumeración de cuentas). • http://www.securityfocus.com/bid/97262 https://www.netiq.com/support/kb/doc.php?id=7018753 https://www.tenable.com/security/research/tra-2017-15 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in NetIQ Sentinel Server 8.0 before 8.0.1 that may allow remote denial of service. Se descubrió una vulnerabilidad en NetIQ Sentinel Server 8.0 en versiones anteriores a 8.0.1 que pueden permitir la denegación remota de servicio. • http://www.securityfocus.com/bid/97267 https://www.netiq.com/support/kb/doc.php?id=7018753 https://www.tenable.com/security/research/tra-2017-15 • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 34%CPEs: 2EXPL: 0

Directory traversal vulnerability in the DumpToFile method in the NQMcsVarSet ActiveX control in Agent Manager in NetIQ Sentinel allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted pathname. Vulnerabilidad de salto de directorio en el método DumpToFile en el control NQMcsVarSet ActiveX en Agent Manager en NetIQ Sentinel permite a atacantes remotos crear archivos arbitrarios, y como consecuencia ejecutar código arbitrario, a través de un nombre de ruta manipulado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell NetIQ. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the NQMcsVarSet ActiveX control. The control exposes the DumpToFile method. • http://secunia.com/advisories/58635 http://www.novell.com/support/kb/doc.php?id=7015183 http://www.securityfocus.com/bid/67487 http://www.securitytracker.com/id/1030434 http://zerodayinitiative.com/advisories/ZDI-14-134 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •