Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2010-3899
Disclosure Date: November 12, 2010 (last updated October 04, 2023)
IBM OmniFind Enterprise Edition 8.x and 9.x performs web crawls with an unlimited recursion depth, which allows remote web servers to cause a denial of service (infinite loop) via a crafted series of documents.
0
Attacker Value
Unknown
CVE-2010-3896
Disclosure Date: November 12, 2010 (last updated October 04, 2023)
The ESSearchApplication directory tree in IBM OmniFind Enterprise Edition 8.x and 9.x does not require authentication, which allows remote attackers to modify the server configuration via a request to palette.do.
0
Attacker Value
Unknown
CVE-2010-3892
Disclosure Date: November 12, 2010 (last updated October 04, 2023)
Session fixation vulnerability in the login form in the administrator interface in IBM OmniFind Enterprise Edition 8.x and 9.x allows remote attackers to hijack web sessions by replaying a session ID (aka SID) value.
0
Attacker Value
Unknown
CVE-2010-3893
Disclosure Date: November 12, 2010 (last updated October 04, 2023)
The administrator interface in IBM OmniFind Enterprise Edition 8.x and 9.x does not restrict use of a session ID (aka SID) value to a single IP address, which allows remote attackers to perform arbitrary administrative actions by leveraging cookie theft, related to a "session impersonation" issue.
0
Attacker Value
Unknown
CVE-2010-3897
Disclosure Date: November 12, 2010 (last updated October 04, 2023)
ESSearchApplication/palette.do in IBM OmniFind Enterprise Edition 8.x and 9.x includes the administrator password in the HTML source code, which might allow remote attackers to obtain sensitive information by leveraging read access to this file.
0
Attacker Value
Unknown
CVE-2010-3898
Disclosure Date: November 12, 2010 (last updated October 04, 2023)
IBM OmniFind Enterprise Edition 8.x and 9.x does not properly restrict the cookie path of administrator (aka ESAdmin) cookies, which might allow remote attackers to bypass authentication by leveraging access to other pages on the web site.
0