Page 17 of 86 results (0.010 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix. • http://support.novell.com/padlock/details.htm http://www.securityfocus.com/archive/1/204672 http://www.securityfocus.com/bid/3189 https://exchange.xforce.ibmcloud.com/vulnerabilities/6998 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

GroupWise WebAccess 5.5 with directory indexing enabled allows a remote attacker to view arbitrary directory contents via an HTTP request with a lowercase "get". • http://www.securityfocus.com/archive/1/204875 http://www.securityfocus.com/bid/3188 https://exchange.xforce.ibmcloud.com/vulnerabilities/6988 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Novell Groupwise 5.5 (sp1 and sp2) allows a remote user to access arbitrary files via an implementation error in Groupwise system policies. • http://marc.info/?l=bugtraq&m=98185226715517&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

The Java Server in the Novell GroupWise Web Access Enhancement Pack allows remote attackers to cause a denial of service via a long URL to the servlet. • https://www.exploit-db.com/exploits/19744 http://archives.neohapsis.com/archives/bugtraq/2000-02/0049.html http://www.securityfocus.com/bid/972 •

CVSS: 5.0EPSS: 4%CPEs: 3EXPL: 1

Groupwise web server GWWEB.EXE allows remote attackers to read arbitrary files with .htm extensions via a .. (dot dot) attack using the HELP parameter. • https://www.exploit-db.com/exploits/19682 http://marc.info/?l=bugtraq&m=94571433731824&w=2 http://www.osvdb.org/3413 http://www.securityfocus.com/bid/879 •