Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
private SSL key embedded in JAR file in iManager
Disclosure Date: March 02, 2018 (last updated November 08, 2023)
NetIQ iManager before 3.0.3 delivered a SSL private key in a Java application (JAR file) for authentication to Sentinel, allowing attackers to extract and establish their own connections to the Sentinel appliance.
0
Attacker Value
Unknown
CVE-2013-3268
Disclosure Date: April 24, 2013 (last updated October 05, 2023)
Novell iManager 2.7 before SP6 Patch 1 does not refresh a token after a logout action, which has unspecified impact and remote attack vectors.
0
Attacker Value
Unknown
CVE-2013-1088
Disclosure Date: April 24, 2013 (last updated October 05, 2023)
Cross-site request forgery (CSRF) vulnerability in Novell iManager 2.7 before SP6 Patch 1 allows remote attackers to hijack the authentication of arbitrary users by leveraging improper request validation by iManager code deployed within an Apache Tomcat container.
0
Attacker Value
Unknown
CVE-2011-4188
Disclosure Date: April 09, 2012 (last updated October 04, 2023)
Buffer overflow in the Create Attribute function in jclient in Novell iManager 2.7.4 before patch 4 allows remote authenticated users to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted EnteredAttrName parameter, a related issue to CVE-2010-1929.
0
Attacker Value
Unknown
CVE-2010-1930
Disclosure Date: June 28, 2010 (last updated October 04, 2023)
Off-by-one error in Novell iManager 2.7, 2.7.3, and 2.7.3 FTF2 allows remote attackers to cause a denial of service (daemon crash) via a long tree parameter in a login request to nps/servlet/webacc.
0
Attacker Value
Unknown
CVE-2010-1929
Disclosure Date: June 28, 2010 (last updated October 04, 2023)
Multiple stack-based buffer overflows in the jclient._Java_novell_jclient_JClient_defineClass@20 function in jclient.dll in the Tomcat web server in Novell iManager 2.7, 2.7.3, and 2.7.3 FTF2 allow remote authenticated users to execute arbitrary code via the (1) EnteredClassID or (2) NewClassName parameter to nps/servlet/webacc.
0