2 results (0.006 seconds)

CVSS: 4.3EPSS: 4%CPEs: 8EXPL: 2

Novell Sentinel Log Manager before 1.2.0.3 allows remote attackers to create data retention policies via a crafted text/x-gwt-rpc request to novelllogmanager/datastorageservice.rpc, and allows remote authenticated Report Administrators to create data retention policies via a search-results "Save Query As" "Save As Retention Policy" action. Novel Sentinel Log Manager anterior a v1.2.0.3 permite a atacantes remotos crear políticas de retención de datos a través de una petición test/-x-gwt-rpc manipulada para novelllogmanager/datastorageservice.rpc, y permite a los administradores de informes autenticados crear políticas de retención de datos a través de un resultado de búsqueda "Save Query As" "Save As Retention Policy". • https://www.exploit-db.com/exploits/21744 http://seclists.org/fulldisclosure/2012/Oct/25 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5150932.html https://bugzilla.novell.com/show_bug.cgi?id=771634 https://www.netiq.com/documentation/novelllogmanager12/readme/data/log_manager1203_readme.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.0EPSS: 1%CPEs: 1EXPL: 1

Directory traversal vulnerability in novelllogmanager/FileDownload in Novell Sentinel Log Manager 1.2.0.1_938 and earlier, as used in Novell Sentinel before 7.0.1.0, allows remote authenticated users to read arbitrary files via a .. (dot dot) in the filename parameter. Una vulnerabilidad de salto de directorio en novelllogmanager/FileDownload en Novell Sentinel Log Manager versión 1.2.0.1_938 y anteriores, como es usado en Novell Sentinel anterior a versión 7.0.1.0, permite a los usuarios autenticados remotos leer archivos arbitrarios por medio de .. (punto punto) en el parámetro filename. • https://www.exploit-db.com/exploits/21082 http://archives.neohapsis.com/archives/fulldisclosure/2011-12/0368.html http://osvdb.org/77948 http://secunia.com/advisories/47258 http://secunia.com/advisories/48760 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5138757.html http://www.securitytracker.com/id?1026437 https://exchange.xforce.ibmcloud.com/vulnerabilities/71861 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •