Page 8 of 48 results (0.004 seconds)

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 through 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote attackers to read directories and files on the server. • http://secunia.com/advisories/11119 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10091330.htm http://www.securityfocus.com/bid/9864 http://www.securitytracker.com/alerts/2004/Mar/1009417.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15467 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in Novell GroupWise 6 SP3 WebAccess before Revision F has unknown impact and attack vectors related to "malicious script." • http://secunia.com/advisories/8133 http://support.novell.com/servlet/tidfinder/2964956 http://www.securityfocus.com/bid/6896 http://www.securitytracker.com/id?1006171 https://exchange.xforce.ibmcloud.com/vulnerabilities/11394 •

CVSS: 7.5EPSS: 5%CPEs: 3EXPL: 0

Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote attackers to execute arbitrary code via a long RCPT TO command. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0296.html http://support.novell.com/servlet/tidfinder/2963273 http://www.iss.net/security_center/static/9671.php http://www.securityfocus.com/bid/5313 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

GWWEB.EXE in GroupWise Web Access 5.5, and possibly other versions, allows remote attackers to determine the full pathname of the web server via an HTTP request with an invalid HTMLVER parameter. • http://marc.info/?l=bugtraq&m=101494830315071&w=2 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password. GroupWise 6, cuando se usa autenticación LDAP y cuando Post Office tiene un un nombre de usuario y contraseña en blanco, permite a atacantes ganar privilegios de otros usuaios iniciando una sesión en el sistema sin con contraseña. • http://marc.info/?l=bugtraq&m=101425369510983&w=2 http://www.securityfocus.com/bid/4154 •