Page 6 of 35 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

grpWise.exe for Novell GroupWise client 5.5 through 6.5.2 stores the password in plaintext in memory, which allows attackers to obtain the password using a debugger or another mechanism to read process memory. • http://archives.neohapsis.com/archives/bugtraq/2005-06/0158.html http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0858.html http://marc.info/?l=bugtraq&m=112431139225724&w=2 http://securitytracker.com/id?1014247 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098073.htm http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972056.htm http://www.osvdb.org/17470 http://www.securiteam.com/windowsntfocus/5UP0Q0UG0I.html http://www.securityfocus.com/bid/1399 •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 2

Cross-site scripting (XSS) vulnerability in Novell Groupwise WebAccess 6.5 before July 11, 2005 allows remote attackers to inject arbitrary web script or HTML via an e-mail message with an encoded javascript URI (e.g. "j&#X41vascript" in an IMG tag. Vulnerabilidad de secuencia de comandos en sitios cruzados en Novell Groupwise WebAccess 6.5 anterior a July 11, 2005 permite que atacantes remotos inyecten script web arbitrario o HTML mediante un mensaje de correo con un javascript codificado en un URI (e.g. "jAvascript" en una etiqueta IMG). • https://www.exploit-db.com/exploits/26001 http://marc.info/?l=bugtraq&m=112181451014783&w=2 http://secunia.com/advisories/16098 http://securitytracker.com/id?1014515 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098301.htm http://www.infobyte.com.ar/adv/ISR-11.html http://www.osvdb.org/18064 http://www.securityfocus.com/bid/14310 https://exchange.xforce.ibmcloud.com/vulnerabilities/21421 •

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 0

NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue • http://marc.info/?l=bugtraq&m=110608203729814&w=2 http://support.novell.com/servlet/tidfinder/10096251 http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-01/0771.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2005-01/0341.html http://www.osvdb.org/13135 http://www.securityfocus.com/bid/12285 https://exchange.xforce.ibmcloud.com/vulnerabilities/18954 •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 through 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote attackers to read directories and files on the server. • http://secunia.com/advisories/11119 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10091330.htm http://www.securityfocus.com/bid/9864 http://www.securitytracker.com/alerts/2004/Mar/1009417.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15467 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in Novell GroupWise 6 SP3 WebAccess before Revision F has unknown impact and attack vectors related to "malicious script." • http://secunia.com/advisories/8133 http://support.novell.com/servlet/tidfinder/2964956 http://www.securityfocus.com/bid/6896 http://www.securitytracker.com/id?1006171 https://exchange.xforce.ibmcloud.com/vulnerabilities/11394 •