11 results (0.009 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Novell iChain Mini FTP Server 2.3 displays different error messages if a user exists or not, which allows remote attackers to obtain sensitive information and facilitates brute force attacks. • http://marc.info/?l=bugtraq&m=111091027000721&w=2 http://secunia.com/advisories/14607 http://www.infobyte.com.ar/adv/ISR-04.html http://www.securityfocus.com/bid/12811 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 0

Novell iChain Mini FTP Server 2.3, and possibly earlier versions, does not limit the number of incorrect logins, which makes it easier for remote attackers to conduct brute force login attacks. • http://marc.info/?l=bugtraq&m=111091517007681&w=2 http://secunia.com/advisories/14607 http://securitytracker.com/id?1013408 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096887.htm http://www.infobyte.com.ar/adv/ISR-05.html http://www.osvdb.org/14648 •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

The Mini FTP server in Novell iChain 2.2 and 2.3 SP2 and earlier allows remote unauthenticated attackers to obtain the full path of the server via the PWD command. • http://marc.info/?l=bugtraq&m=111091102023359&w=2 http://secunia.com/advisories/14537 http://securitytracker.com/id?1013407 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096886.htm http://www.infobyte.com.ar/adv/ISR-03.html http://www.securityfocus.com/bid/12766 https://exchange.xforce.ibmcloud.com/vulnerabilities/19643 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser. • http://secunia.com/advisories/14527 http://securitytracker.com/id?1013406 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10096885.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/19646 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The Telnet listener for Novell iChain Server before 2.2 Field Patch 3b 2.2.116 does not have a password by default, which allows remote attackers to gain access. • http://www.ciac.org/ciac/bulletins/o-080.shtml http://www.securitytracker.com/alerts/2004/Feb/1008961.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15068 •