Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Novell Subscribe
Filtered by product Access Manager
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2009-4878 1 Novell 1 Access Manager 2017-08-16 4.3 MEDIUM N/A
Unspecified vulnerability in the Administration Console in Novell Access Manager before 3.1 SP1 allows attackers to access system files via unknown attack vectors.
CVE-2010-0284 2 Microsoft, Novell 2 Windows, Access Manager 2017-08-16 10.0 HIGH N/A
Directory traversal vulnerability in the getEntry method in the PortalModuleInstallManager component in a servlet in nps.jar in the Administration Console (aka Access Management Console) in Novell Access Manager 3.1 before 3.1.2-281 on Windows allows remote attackers to create arbitrary files with any contents, and consequently execute arbitrary code, via a .. (dot dot) in a parameter, aka ZDI-CAN-678.
CVE-2007-3570 1 Novell 1 Access Manager 2011-03-07 7.5 HIGH N/A
The Linux Access Gateway in Novell Access Manager before 3.0 SP1 Release Candidate 1 (RC1) allows remote attackers to bypass unspecified security controls via Fullwidth/Halfwidth Unicode encoded data in a HTTP POST request.
CVE-2007-1309 1 Novell 1 Access Manager 2011-03-07 9.0 HIGH N/A
Novell Access Management 3 SSLVPN Server allows remote authenticated users to bypass VPN restrictions by making policy.txt read-only, disconnecting, then manually modifying policy.txt.
CVE-2009-4879 1 Novell 1 Access Manager 2010-05-26 4.3 MEDIUM N/A
The Identity Server in Novell Access Manager before 3.1 SP1 allows attackers with disabled Active Directory accounts to authenticate using X.509 authentication, which bypasses intended access restrictions.
CVE-2008-6722 1 Novell 1 Access Manager 2009-04-28 1.9 LOW N/A
Novell Access Manager 3 SP4 does not properly expire X.509 certificate sessions, which allows physically proximate attackers to obtain a logged-in session by using a victim's web-browser process that continues to send the original and valid SSL sessionID, related to inability of Apache Tomcat to clear entries from its SSL cache.