Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
imanager vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-5189
NetIQ iManager prior to 3.0.3 delivered a SSL private key in a Java application (JAR file) for authentication to Sentinel, allowing malicious users to extract and establish their own connections to the Sentinel appliance.
Netiq Imanager 3.0
Netiq Imanager 3.0.3
Netiq Imanager 2.7.6
Netiq Imanager 2.7.5
Netiq Imanager 2.7.4
Netiq Imanager 2.7.3
Netiq Imanager 2.7.2
Netiq Imanager 2.7.1
Netiq Imanager 2.7
Netiq Imanager 2.7.7
Netiq Imanager 2.7.7.10
Netiq Imanager 3.0.2
10
CVSSv2
CVE-2013-3268
Novell iManager 2.7 before SP6 Patch 1 does not refresh a token after a logout action, which has unspecified impact and remote attack vectors.
Novell Imanager 2.7.0
Novell Imanager 2.7.1
Novell Imanager 2.7.2
Novell Imanager 2.7
Novell Imanager 2.7.3
Novell Imanager 2.7.4
Novell Imanager 2.7.5
Novell Imanager
4
CVSSv2
CVE-2011-4188
Buffer overflow in the Create Attribute function in jclient in Novell iManager 2.7.4 before patch 4 allows remote authenticated users to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted EnteredAttrName parameter, a related issu...
Novell Imanager
Novell Imanager 2.7.3
Novell Imanager 2.0
Novell Imanager 1.5
Novell Imanager 2.7.0
Novell Imanager 2.6.0
Novell Imanager 2.5
Novell Imanager 2.0.2
6.8
CVSSv2
CVE-2013-1088
Cross-site request forgery (CSRF) vulnerability in Novell iManager 2.7 before SP6 Patch 1 allows remote malicious users to hijack the authentication of arbitrary users by leveraging improper request validation by iManager code deployed within an Apache Tomcat container.
Novell Imanager 2.7
Novell Imanager 2.7.3
Novell Imanager 2.7.4
Novell Imanager 2.7.5
Novell Imanager
Novell Imanager 2.7.1
Novell Imanager 2.7.2
7.5
CVSSv2
CVE-2009-4486
Stack-based buffer overflow in the eDirectory plugin in Novell iManager prior to 2.7.3 allows remote malicious users to execute arbitrary code via vectors that trigger long arguments to an unspecified sub-application, related to importing and exporting from a schema.
Novell Imanager 1.5
Novell Imanager
Novell Imanager 2.7.1
Novell Imanager 2.0.2
Novell Imanager 2.0
Novell Imanager 2.6.0
Novell Imanager 2.5
4.3
CVSSv2
CVE-2017-7430
Novell iManager 2.7.x prior to 2.7 SP7 Patch 10 HF1 and NetIQ iManager 3.x prior to 3.0.3.1 have a persistent XSS vulnerability in Framework.
Novell Imanager 2.7
Netiq Imanager 3.0.1
Netiq Imanager 3.0.3.1
Netiq Imanager 3.0
Netiq Imanager 3.0.3
Netiq Imanager 3.0.2.1
Netiq Imanager 3.0.2
6.8
CVSSv2
CVE-2017-7431
Novell iManager 2.7.x prior to 2.7 SP7 Patch 10 HF1 and NetIQ iManager 3.x prior to 3.0.3.1 have persistent CSRF in object management.
Novell Imanager 2.7
Netiq Imanager 3.0.1
Netiq Imanager 3.0.3.1
Netiq Imanager 3.0
Netiq Imanager 3.0.3
Netiq Imanager 3.0.2.1
Netiq Imanager 3.0.2
7.5
CVSSv2
CVE-2017-7432
Novell iManager 2.7.x prior to 2.7 SP7 Patch 10 HF1 and NetIQ iManager 3.x prior to 3.0.3.1 have a webshell upload vulnerability.
Novell Imanager 2.7
Netiq Imanager 3.0.1
Netiq Imanager 3.0.3.1
Netiq Imanager 3.0
Netiq Imanager 3.0.3
Netiq Imanager 3.0.2.1
Netiq Imanager 3.0.2
5
CVSSv2
CVE-2017-7428
NetIQ iManager 3.x prior to 3.0.3.1 has an issue in the renegotiation of connection parameters with Tomcat.
Netiq Imanager 3.0.1
Netiq Imanager 3.0.3.1
Netiq Imanager 3.0
Netiq Imanager 3.0.3
Netiq Imanager 3.0.2.1
Netiq Imanager 3.0.2
7.5
CVSSv2
CVE-2008-3488
Unspecified vulnerability in Novell iManager prior to 2.7 SP1 (2.7.1) allows remote malicious users to delete Plug-in Studio created Property Book Pages via unknown vectors.
Novell Imanager 2.5
Novell Imanager 2.6.0
Novell Imanager 1.5
Novell Imanager 2.0
Novell Imanager 2.7.0
Novell Imanager 2.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »