Lucene search

K
NovellIchain

14 matches found

CVE
CVE
added 2003/08/27 4:0 a.m.48 views

CVE-2003-0636

Novell iChain 2.2 before Support Pack 1 does not properly verify that URL redirects match the DNS name of an accelerator, which allows attackers to redirect URLs to malicious web sites.

7.5CVSS6.9AI score0.00229EPSS
CVE
CVE
added 2003/08/27 4:0 a.m.46 views

CVE-2003-0639

Unknown vulnerability in Novell iChain 2.2 before Support Pack 1 allows users to access restricted or secure pages without authentication.

5CVSS6.8AI score0.00281EPSS
CVE
CVE
added 2005/11/28 11:0 p.m.45 views

CVE-2004-2580

Cross-site scripting (XSS) vulnerability in Novell iChain 2.3 allows remote attackers to obtain login credentials via unspecified vectors.

5.8CVSS6.1AI score0.006EPSS
CVE
CVE
added 2007/11/20 2:0 a.m.44 views

CVE-2004-2757

Cross-site scripting (XSS) vulnerability in the failed login page in Novell iChain before 2.2 build 2.2.113 and 2.3 First Customer Ship (FCS) allows remote attackers to inject arbitrary web script or HTML via url parameter.

4.3CVSS6AI score0.00271EPSS
CVE
CVE
added 2003/08/27 4:0 a.m.41 views

CVE-2003-0638

Multiple buffer overflows in Novell iChain 2.1 before Field Patch 3, and iChain 2.2 before Field Patch 1a, allow attackers to cause a denial of service (ABEND) and possibly execute arbitrary code via (1) a long user name or (2) an unknown attack related to a "special script against login."

7.5CVSS8.2AI score0.00554EPSS
CVE
CVE
added 2003/08/27 4:0 a.m.40 views

CVE-2003-0635

Unknown vulnerability or vulnerabilities in Novell iChain 2.2 before Support Pack 1, with unknown impact, possibly related to unauthorized access to (1) NCPIP.NLM and (2) JSTCP.NLM.

5CVSS7.2AI score0.00274EPSS
CVE
CVE
added 2005/08/16 4:0 a.m.40 views

CVE-2004-2314

The Telnet listener for Novell iChain Server before 2.2 Field Patch 3b 2.2.116 does not have a password by default, which allows remote attackers to gain access.

7.5CVSS7.5AI score0.00361EPSS
CVE
CVE
added 2003/08/27 4:0 a.m.39 views

CVE-2003-0637

Novell iChain 2.2 before Support Pack 1 uses a shorter timeout for a non-existent user than a valid user, which makes it easier for remote attackers to guess usernames and conduct brute force password guessing.

5CVSS7.2AI score0.00946EPSS
CVE
CVE
added 2005/11/28 11:0 p.m.39 views

CVE-2004-2581

Novell iChain 2.3 allows attackers to cause a denial of service via a URL with a "specific string."

5CVSS6.8AI score0.0082EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.38 views

CVE-2005-0746

The Mini FTP server in Novell iChain 2.2 and 2.3 SP2 and earlier allows remote unauthenticated attackers to obtain the full path of the server via the PWD command.

5CVSS7.1AI score0.00374EPSS
CVE
CVE
added 2005/11/28 11:0 p.m.35 views

CVE-2004-2579

ACLCHECK module in Novell iChain 2.3 allows attackers to bypass access control rules of an unspecified component via an unspecified attack vector involving a string that contains escape sequences represented with "overlong UTF-8 encoding."

7.5CVSS7AI score0.00482EPSS
CVE
CVE
added 2005/11/28 11:0 p.m.35 views

CVE-2004-2582

Novell iChain 2.3 includes the build number in the VIA line of the proxy server's HTTP headers, which allows remote attackers to obtain sensitive information.

5CVSS6.8AI score0.00534EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.35 views

CVE-2005-0744

The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser...

10CVSS7.2AI score0.00378EPSS
CVE
CVE
added 2005/03/20 5:0 a.m.32 views

CVE-2005-0798

Novell iChain Mini FTP Server 2.3, and possibly earlier versions, does not limit the number of incorrect logins, which makes it easier for remote attackers to conduct brute force login attacks.

7.5CVSS7.2AI score0.02131EPSS