Page 130 of 671 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix. • http://support.novell.com/padlock/details.htm http://www.securityfocus.com/archive/1/204672 http://www.securityfocus.com/bid/3189 https://exchange.xforce.ibmcloud.com/vulnerabilities/6998 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

GroupWise WebAccess 5.5 with directory indexing enabled allows a remote attacker to view arbitrary directory contents via an HTTP request with a lowercase "get". • http://www.securityfocus.com/archive/1/204875 http://www.securityfocus.com/bid/3188 https://exchange.xforce.ibmcloud.com/vulnerabilities/6988 •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 2

Remote attackers can cause a denial of service in Novell BorderManager 3.6 and earlier by sending TCP SYN flood to port 353. • https://www.exploit-db.com/exploits/264 http://archives.neohapsis.com/archives/bugtraq/2001-05/0000.html http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0020.html http://marc.info/?l=bugtraq&m=98779821207867&w=2 http://marc.info/?l=bugtraq&m=98865027328391&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm http://www.securityfocus.com/bid/2623 https://exchange.xforce.ibmcloud.com/vulnerabilities/6429 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Novell Groupwise 5.5 (sp1 and sp2) allows a remote user to access arbitrary files via an implementation error in Groupwise system policies. • http://marc.info/?l=bugtraq&m=98185226715517&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Novell NetWare Transaction Tracking System (TTS) in Novell 4.11 and earlier allows remote attackers to cause a denial of service via a large number of requests. • http://archives.neohapsis.com/archives/bugtraq/1999_2/0439.html https://exchange.xforce.ibmcloud.com/vulnerabilities/2184 •