Page 14 of 75 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

GWWEB.EXE in GroupWise Web Access 5.5, and possibly other versions, allows remote attackers to determine the full pathname of the web server via an HTTP request with an invalid HTMLVER parameter. • http://marc.info/?l=bugtraq&m=101494830315071&w=2 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password. GroupWise 6, cuando se usa autenticación LDAP y cuando Post Office tiene un un nombre de usuario y contraseña en blanco, permite a atacantes ganar privilegios de otros usuaios iniciando una sesión en el sistema sin con contraseña. • http://marc.info/?l=bugtraq&m=101425369510983&w=2 http://www.securityfocus.com/bid/4154 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 2

Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote attackers to gain privileges. • https://www.exploit-db.com/exploits/21182 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10067329.htm http://www.iss.net/security_center/static/7701.php http://www.securityfocus.com/archive/1/245871 http://www.securityfocus.com/bid/3697 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 1

Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote attackers to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character. • http://online.securityfocus.com/archive/1/220667 http://support.novell.com/servlet/tidfinder/2960443 http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/advisories_template.htm%3Findexid%3D12 http://www.kb.cert.org/vuls/id/341539 http://www.novell.com/coolsolutions/gwmag/features/a_webaccess_security_gw.html http://www.securityfocus.com/bid/3436 https://exchange.xforce.ibmcloud.com/vulnerabilities/7287 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix. • http://support.novell.com/padlock/details.htm http://www.securityfocus.com/archive/1/204672 http://www.securityfocus.com/bid/3189 https://exchange.xforce.ibmcloud.com/vulnerabilities/6998 •