Vulnerabilities > Novell > Ichain > 2.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-05-02 | CVE-2005-0746 | Remote Path Disclosure vulnerability in Novell Ichain 2.2/2.2.113/2.3 The Mini FTP server in Novell iChain 2.2 and 2.3 SP2 and earlier allows remote unauthenticated attackers to obtain the full path of the server via the PWD command. | 5.0 |
2005-05-02 | CVE-2005-0744 | Remote Security vulnerability in iChain Server The web GUI for Novell iChain 2.2 and 2.3 SP2 and SP3 allows attackers to hijack sessions and gain administrator privileges by (1) sniffing the connection on TCP port 51100 and replaying the authentication information or (2) obtaining and replaying the PCZQX02 authentication cookie from the browser. | 10.0 |
2005-03-15 | CVE-2005-0798 | Remote Security vulnerability in Novell Ichain 2.2/2.2.113/2.3 Novell iChain Mini FTP Server 2.3, and possibly earlier versions, does not limit the number of incorrect logins, which makes it easier for remote attackers to conduct brute force login attacks. | 7.5 |
2005-03-15 | CVE-2005-0797 | Remote Information Disclosure vulnerability in Novell iChain Mini FTP Server Novell iChain Mini FTP Server 2.3 displays different error messages if a user exists or not, which allows remote attackers to obtain sensitive information and facilitates brute force attacks. | 5.0 |
2004-12-31 | CVE-2004-2582 | Remote vulnerability in Novell Ichain 2.3 Novell iChain 2.3 includes the build number in the VIA line of the proxy server's HTTP headers, which allows remote attackers to obtain sensitive information. | 5.0 |
2004-12-31 | CVE-2004-2581 | Remote vulnerability in Novell Ichain 2.3 Novell iChain 2.3 allows attackers to cause a denial of service via a URL with a "specific string." | 5.0 |
2004-12-31 | CVE-2004-2580 | Remote vulnerability in Novell Ichain 2.3 Cross-site scripting (XSS) vulnerability in Novell iChain 2.3 allows remote attackers to obtain login credentials via unspecified vectors. network novell | 5.8 |
2004-12-31 | CVE-2004-2579 | Remote vulnerability in Novell Ichain 2.3 ACLCHECK module in Novell iChain 2.3 allows attackers to bypass access control rules of an unspecified component via an unspecified attack vector involving a string that contains escape sequences represented with "overlong UTF-8 encoding." | 7.5 |