Page 12 of 75 results (0.018 seconds)

CVSS: 10.0EPSS: 94%CPEs: 2EXPL: 0

Stack-based buffer overflow in the base64_decode function in GWINTER.exe in Novell GroupWise (GW) WebAccess before 7.0 SP2 allows remote attackers to execute arbitrary code via long base64 content in an HTTP Basic Authentication request. Desbordamiento de búfer basado en pila en la función base64_decode en GWINTER.exe en Novell GroupWise (GW) WebAccess anterior a 7.0 SP2 permite a atacantes remotos ejecutar código de su elección a través de un contenido grande en base64 en una respuesta HTTP Basic Authentication. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise WebAccess. Authentication is not required to exploit this vulnerability. The specific flaw exists in the GWINTER.exe process bound by default on TCP ports 7205 and 7211. During the handling of an HTTP Basic authentication request, the process copies user-supplied base64 data into a fixed length stack buffer. • http://download.novell.com/Download?buildid=8RF83go0nZg~ http://download.novell.com/Download?buildid=O9ucpbS1bK0~ http://secunia.com/advisories/24944 http://securityreason.com/securityalert/2610 http://www.securityfocus.com/archive/1/466212/100/0/threaded http://www.securityfocus.com/bid/23556 http://www.securitytracker.com/id?1017932 http://www.vupen.com/english/advisories/2007/1455 http://www.zerodayinitiative.com/advisories/ZDI-07-015.html •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in webacc in Novell GroupWise WebAccess before 7 Support Pack 3 Public Beta allow remote attackers to inject arbitrary web script or HTML via the (1) User.html, (2) Error, (3) User.Theme.index, and (4) and User.lang parameters. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS)en el webacc de Novell GroupWise WebAccess anterior a la v.7 Support Pack 3 Public Beta, que permite a atacantes remoto inyectar código web o HTML de su elección a través de los parámetros (1) User.html, (2) Error, (3) User.Theme.index, y (4) User.Lang • https://www.exploit-db.com/exploits/31095 http://secunia.com/advisories/28778 http://www.novell.com/documentation/gw7/readmeusgw7sp3/readmeusgw7sp3.html#b4qb42z http://www.osvdb.org/27531 http://www.securityfocus.com/bid/27582 http://www.securitytracker.com/id?1019302 http://www.vupen.com/english/advisories/2008/0395 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 1%CPEs: 18EXPL: 0

Unspecified vulnerability in the Windows Client API in Novell GroupWise 5.x through 7 might allow users to obtain "random programmatic access" to other email within the same post office. Vulnerabilidad sin especificar en la API de cliente en Novell GroupWise para Windows v5.x a v7 podría permitir a los usuarios obtener "acceso programático aleatorio" (random programmatic access) a correo electrónico de otros del misma oficina de correos. • http://secunia.com/advisories/20888 http://securitytracker.com/id?1016404 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973921.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974006.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?2974027.htm http://www.securityfocus.com/archive/1/438725/100/0/threaded http://www.securityfocus.com/bid/18716 http://www.vupen.com/english/advisories/2006/2594 https://exchange.xforce.ibmcloud.com/vulnerabilities/27 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 2

Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key. • https://www.exploit-db.com/exploits/26301 http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0763.html http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037442.html http://marc.info/?l=bugtraq&m=112784386426802&w=2 http://securityreason.com/securityalert/28 http://securitytracker.com/id?1014977 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098814.htm http://support.novell.com/techcenter/search/search.do?cmd=displayKC&docType=%20c&externalId=10098814html&am •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

grpWise.exe for Novell GroupWise client 5.5 through 6.5.2 stores the password in plaintext in memory, which allows attackers to obtain the password using a debugger or another mechanism to read process memory. • http://archives.neohapsis.com/archives/bugtraq/2005-06/0158.html http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0858.html http://marc.info/?l=bugtraq&m=112431139225724&w=2 http://securitytracker.com/id?1014247 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098073.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972056.htm http://www.osvdb.org/17470 http://www.securiteam.com/windowsntfocus/5UP0Q0UG0I.html http://www.securityfocus.com/bid/1399 •