Page 14 of 86 results (0.006 seconds)

CVSS: 5.0EPSS: 1%CPEs: 18EXPL: 0

Unspecified vulnerability in the Windows Client API in Novell GroupWise 5.x through 7 might allow users to obtain "random programmatic access" to other email within the same post office. Vulnerabilidad sin especificar en la API de cliente en Novell GroupWise para Windows v5.x a v7 podría permitir a los usuarios obtener "acceso programático aleatorio" (random programmatic access) a correo electrónico de otros del misma oficina de correos. • http://secunia.com/advisories/20888 http://securitytracker.com/id?1016404 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973921.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974006.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?2974027.htm http://www.securityfocus.com/archive/1/438725/100/0/threaded http://www.securityfocus.com/bid/18716 http://www.vupen.com/english/advisories/2006/2594 https://exchange.xforce.ibmcloud.com/vulnerabilities/27 •

CVSS: 10.0EPSS: 39%CPEs: 1EXPL: 2

Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Novell GroupWise Messenger. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Novell Messaging Agent, a web server that listens by default on TCP port 8300. • https://www.exploit-db.com/exploits/16757 http://cirt.dk/advisories/cirt-42-advisory.txt http://metasploit.blogspot.com/2006/04/exploit-development-groupwise_14.html http://secunia.com/advisories/19663 http://securitytracker.com/id?1015911 http://support.novell.com/cgi-bin/search/searchtid.cgi?10100861.htm http://www.osvdb.org/24617 http://www.securityfocus.com/archive/1/430911/100/0/threaded http://www.securityfocus.com/bid/17503 http://www.vupen.com/english/advisories/2006 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 2

Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key. • https://www.exploit-db.com/exploits/26301 http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0763.html http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037442.html http://marc.info/?l=bugtraq&m=112784386426802&w=2 http://securityreason.com/securityalert/28 http://securitytracker.com/id?1014977 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098814.htm http://support.novell.com/techcenter/search/search.do?cmd=displayKC&docType=%20c&externalId=10098814html&am •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

grpWise.exe for Novell GroupWise client 5.5 through 6.5.2 stores the password in plaintext in memory, which allows attackers to obtain the password using a debugger or another mechanism to read process memory. • http://archives.neohapsis.com/archives/bugtraq/2005-06/0158.html http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0858.html http://marc.info/?l=bugtraq&m=112431139225724&w=2 http://securitytracker.com/id?1014247 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098073.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972056.htm http://www.osvdb.org/17470 http://www.securiteam.com/windowsntfocus/5UP0Q0UG0I.html http://www.securityfocus.com/bid/1399 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Buffer overflow in Novell GroupWise 6.5 Client allows remote attackers to execute arbitrary code via a GWVW02xx.INI language file with a long entry, as demonstrated using a long ES02TKS.VEW value in the Group Task section. Desbordamiento de búfer en Cliente Novell GroupWise 6.5 permite que atacantes remotos ejecuten código arbitrario mediante un fichero de lenguaje GWVW02xx.INI con una entrada larga (como se demuestra usando un valor largo para ESO2TKS.VEW en la sección Group Task). • http://marc.info/?l=bugtraq&m=112247652532002&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098314.htm •