Page 15 of 75 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix. • http://support.novell.com/padlock/details.htm http://www.securityfocus.com/archive/1/204672 http://www.securityfocus.com/bid/3189 https://exchange.xforce.ibmcloud.com/vulnerabilities/6998 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Novell Groupwise 5.5 (sp1 and sp2) allows a remote user to access arbitrary files via an implementation error in Groupwise system policies. • http://marc.info/?l=bugtraq&m=98185226715517&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

The Java Server in the Novell GroupWise Web Access Enhancement Pack allows remote attackers to cause a denial of service via a long URL to the servlet. • https://www.exploit-db.com/exploits/19744 http://archives.neohapsis.com/archives/bugtraq/2000-02/0049.html http://www.securityfocus.com/bid/972 •

CVSS: 5.0EPSS: 4%CPEs: 3EXPL: 1

Groupwise web server GWWEB.EXE allows remote attackers to read arbitrary files with .htm extensions via a .. (dot dot) attack using the HELP parameter. • https://www.exploit-db.com/exploits/19682 http://marc.info/?l=bugtraq&m=94571433731824&w=2 http://www.osvdb.org/3413 http://www.securityfocus.com/bid/879 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Groupwise web server GWWEB.EXE allows remote attackers to determine the real path of the web server via the HELP parameter. • http://marc.info/?l=bugtraq&m=94571433731824&w=2 •