Page 12 of 86 results (0.005 seconds)

CVSS: 3.5EPSS: 0%CPEs: 16EXPL: 0

Unspecified vulnerability in the Windows client API in Novell GroupWise 7 before SP3 and 6.5 before SP6 Update 3 allows remote authenticated users to access the non-shared stored e-mail messages of another user who has shared at least one folder with the attacker. Vulnerabilidad sin especificar en Windows client API de Novell GroupWise 7 antes de SP3 y 6.5 antes de SP6 Update 3 permite a usuarios remotamente autentificados acceder a los emails no compartidos almacenados de otro usuario que haya compartido al menos una carpeta con el atacante. • http://secunia.com/advisories/29409 http://securitytracker.com/id?1019616 http://www.securityfocus.com/bid/28265 http://www.vupen.com/english/advisories/2008/0904 https://exchange.xforce.ibmcloud.com/vulnerabilities/41223 https://secure-support.novell.com/KanisaPlatform/Publishing/732/3263374_f.SAL_Public.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 37%CPEs: 1EXPL: 2

Stack-based buffer overflow in Novell GroupWise before 6.5.7, when HTML preview of e-mail is enabled, allows user-assisted remote attackers to execute arbitrary code via a long SRC attribute in an IMG element when forwarding or replying to a crafted e-mail. Desbordamiento de búfer basado en pila en Novell GroupWise anterior a 6.5.7, cuando la vista previa HTML del correo está activada, permite a un atacante remoto con la intervención de un usuario ejecutar código de su elección a través de un atributo SRC largo en una elemento IMG cuando responde o reenvía en un correo manipulado. • http://osvdb.org/40870 http://secunia.com/advisories/28102 http://securityreason.com/securityalert/3459 http://www.infobyte.com.ar/adv/ISR-16.html http://www.securityfocus.com/archive/1/485100/100/0/threaded http://www.securityfocus.com/bid/26875 http://www.securitytracker.com/id?1019101 http://www.vupen.com/english/advisories/2007/4273 https://exchange.xforce.ibmcloud.com/vulnerabilities/39032 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the webacc servlet in Novell GroupWise 6.5 WebAccess allows remote attackers to inject arbitrary web script or HTML via the User.Id parameter, as demonstrated by a URL within a url field in a STYLE element, possibly due to an incomplete fix for CVE-2004-2103.2. Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en el servlet webacc en Novell GroupWise 6.5 WebAccess permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro User.Id, como se demostró con la URL con una campo de url en un elemento STYLE, posiblemente relacionado con una solución incompleta para CVE-2004-2103.2. • http://0x000000.com/index.php?i=409 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 19EXPL: 0

The Apache Web Server as used in Novell NetWare 6.5 and GroupWise allows remote attackers to obtain sensitive information via a certain directive to Apache that causes the HTTP-Header response to be modified, which may reveal the server's internal IP address. El servidor web Apache, tal y como se usa en Novell NetWare 6.5 y GroupWise permite a atacantes remotos obtener información sensible mediante cierta directiva para Apache que provoca que la cabecera HTTP de la respuesta sea modificada, lo cual podría revelar la dirección IP interna del servidor. • http://osvdb.org/45742 http://www.vupen.com/english/advisories/2007/2388 https://exchange.xforce.ibmcloud.com/vulnerabilities/35365 https://secure-support.novell.com/KanisaPlatform/Publishing/370/3555327_f.SAL_Public.html •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Novell GroupWise 7 before SP2 20070524, and GroupWise 6 before 6.5 post-SP6 20070522, allows remote attackers to obtain credentials via a man-in-the-middle attack. Novell GroupWise 7 anterior a SP2 20070524, y GroupWise 6 anterior a 6.5 post-SP6 20070522, permite a atacantes remotos obtener credenciales a través de un ataque de "hombre en medio" (man-in-the-middle). • http://osvdb.org/35942 http://secunia.com/advisories/25498 http://securitytracker.com/id?1018180 http://www.securityfocus.com/bid/24258 http://www.vupen.com/english/advisories/2007/2024 https://exchange.xforce.ibmcloud.com/vulnerabilities/34655 https://secure-support.novell.com/KanisaPlatform/Publishing/300/3382383_f.SAL_Public.html •