Filtered by vendor Novell
Subscriptions
Filtered by product Access Manager
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2010-0284 | 2 Microsoft, Novell | 2 Windows, Access Manager | 2024-11-21 | N/A |
Directory traversal vulnerability in the getEntry method in the PortalModuleInstallManager component in a servlet in nps.jar in the Administration Console (aka Access Management Console) in Novell Access Manager 3.1 before 3.1.2-281 on Windows allows remote attackers to create arbitrary files with any contents, and consequently execute arbitrary code, via a .. (dot dot) in a parameter, aka ZDI-CAN-678. | ||||
CVE-2009-4879 | 1 Novell | 1 Access Manager | 2024-11-21 | N/A |
The Identity Server in Novell Access Manager before 3.1 SP1 allows attackers with disabled Active Directory accounts to authenticate using X.509 authentication, which bypasses intended access restrictions. | ||||
CVE-2009-4878 | 1 Novell | 1 Access Manager | 2024-11-21 | N/A |
Unspecified vulnerability in the Administration Console in Novell Access Manager before 3.1 SP1 allows attackers to access system files via unknown attack vectors. | ||||
CVE-2008-6722 | 1 Novell | 1 Access Manager | 2024-11-21 | N/A |
Novell Access Manager 3 SP4 does not properly expire X.509 certificate sessions, which allows physically proximate attackers to obtain a logged-in session by using a victim's web-browser process that continues to send the original and valid SSL sessionID, related to inability of Apache Tomcat to clear entries from its SSL cache. | ||||
CVE-2007-3570 | 1 Novell | 1 Access Manager | 2024-11-21 | N/A |
The Linux Access Gateway in Novell Access Manager before 3.0 SP1 Release Candidate 1 (RC1) allows remote attackers to bypass unspecified security controls via Fullwidth/Halfwidth Unicode encoded data in a HTTP POST request. | ||||
CVE-2007-1309 | 1 Novell | 1 Access Manager | 2024-11-21 | N/A |
Novell Access Management 3 SSLVPN Server allows remote authenticated users to bypass VPN restrictions by making policy.txt read-only, disconnecting, then manually modifying policy.txt. |
Page 1 of 1.