Page 114 of 671 results (0.005 seconds)

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Buffer overflow in Novell GroupWise 6.5 Client allows remote attackers to execute arbitrary code via a GWVW02xx.INI language file with a long entry, as demonstrated using a long ES02TKS.VEW value in the Group Task section. Desbordamiento de búfer en Cliente Novell GroupWise 6.5 permite que atacantes remotos ejecuten código arbitrario mediante un fichero de lenguaje GWVW02xx.INI con una entrada larga (como se demuestra usando un valor largo para ESO2TKS.VEW en la sección Group Task). • http://marc.info/?l=bugtraq&m=112247652532002&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098314.htm •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 2

Cross-site scripting (XSS) vulnerability in Novell Groupwise WebAccess 6.5 before July 11, 2005 allows remote attackers to inject arbitrary web script or HTML via an e-mail message with an encoded javascript URI (e.g. "j&#X41vascript" in an IMG tag. Vulnerabilidad de secuencia de comandos en sitios cruzados en Novell Groupwise WebAccess 6.5 anterior a July 11, 2005 permite que atacantes remotos inyecten script web arbitrario o HTML mediante un mensaje de correo con un javascript codificado en un URI (e.g. "jAvascript" en una etiqueta IMG). • https://www.exploit-db.com/exploits/26001 http://marc.info/?l=bugtraq&m=112181451014783&w=2 http://secunia.com/advisories/16098 http://securitytracker.com/id?1014515 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098301.htm http://www.infobyte.com.ar/adv/ISR-11.html http://www.osvdb.org/18064 http://www.securityfocus.com/bid/14310 https://exchange.xforce.ibmcloud.com/vulnerabilities/21421 •

CVSS: 6.4EPSS: 1%CPEs: 19EXPL: 2

Novell NetMail automatically processes HTML in an attachment without prompting the user to save or open it, which makes it easier for remote attackers to conduct web-based attacks and steal cookies. • https://www.exploit-db.com/exploits/25948 http://secunia.com/advisories/15962 http://securitytracker.com/id?1014439 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972340.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972433.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972438.htm http://www.osvdb.org/17821 http://www.securityfocus.com/bid/14171 http://www.vupen.com/english/advisories/2005/0994 •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 0

Novell eDirectory 8.7.3 allows remote attackers to cause a denial of service (application crash) via a URL containing an MS-DOS device name such as AUX, CON, PRN, COM1, or LPT1. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034536.html http://secunia.com/advisories/15676 http://securitytracker.com/id?1014177 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097766.htm http://www.cirt.dk/advisories/cirt-33-advisory.pdf •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory. • http://secunia.com/advisories/17073 http://secunia.com/advisories/18056 http://www.debian.org/security/2005/dsa-922 http://www.novell.com/linux/security/advisories/2005_29_kernel.html http://www.redhat.com/support/errata/RHSA-2005-514.html http://www.securityfocus.com/archive/1/427980/100/0/threaded http://www.securityfocus.com/bid/13903 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10182 https://access.redhat.com/security/cve/CVE-2005& •