Page 13 of 75 results (0.003 seconds)

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Buffer overflow in Novell GroupWise 6.5 Client allows remote attackers to execute arbitrary code via a GWVW02xx.INI language file with a long entry, as demonstrated using a long ES02TKS.VEW value in the Group Task section. Desbordamiento de búfer en Cliente Novell GroupWise 6.5 permite que atacantes remotos ejecuten código arbitrario mediante un fichero de lenguaje GWVW02xx.INI con una entrada larga (como se demuestra usando un valor largo para ESO2TKS.VEW en la sección Group Task). • http://marc.info/?l=bugtraq&m=112247652532002&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098314.htm •

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 0

NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue • http://marc.info/?l=bugtraq&m=110608203729814&w=2 http://support.novell.com/servlet/tidfinder/10096251 http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-01/0771.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2005-01/0341.html http://www.osvdb.org/13135 http://www.securityfocus.com/bid/12285 https://exchange.xforce.ibmcloud.com/vulnerabilities/18954 •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 through 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote attackers to read directories and files on the server. • http://secunia.com/advisories/11119 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10091330.htm http://www.securityfocus.com/bid/9864 http://www.securitytracker.com/alerts/2004/Mar/1009417.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15467 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in Novell GroupWise 6 SP3 WebAccess before Revision F has unknown impact and attack vectors related to "malicious script." • http://secunia.com/advisories/8133 http://support.novell.com/servlet/tidfinder/2964956 http://www.securityfocus.com/bid/6896 http://www.securitytracker.com/id?1006171 https://exchange.xforce.ibmcloud.com/vulnerabilities/11394 •

CVSS: 7.5EPSS: 5%CPEs: 3EXPL: 0

Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote attackers to execute arbitrary code via a long RCPT TO command. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0296.html http://support.novell.com/servlet/tidfinder/2963273 http://www.iss.net/security_center/static/9671.php http://www.securityfocus.com/bid/5313 •