2 results (0.005 seconds)

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 2

Cross-site scripting (XSS) vulnerability in Novell Groupwise WebAccess 6.5 before July 11, 2005 allows remote attackers to inject arbitrary web script or HTML via an e-mail message with an encoded javascript URI (e.g. "j&#X41vascript" in an IMG tag. Vulnerabilidad de secuencia de comandos en sitios cruzados en Novell Groupwise WebAccess 6.5 anterior a July 11, 2005 permite que atacantes remotos inyecten script web arbitrario o HTML mediante un mensaje de correo con un javascript codificado en un URI (e.g. "jAvascript" en una etiqueta IMG). • https://www.exploit-db.com/exploits/26001 http://marc.info/?l=bugtraq&m=112181451014783&w=2 http://secunia.com/advisories/16098 http://securitytracker.com/id?1014515 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098301.htm http://www.infobyte.com.ar/adv/ISR-11.html http://www.osvdb.org/18064 http://www.securityfocus.com/bid/14310 https://exchange.xforce.ibmcloud.com/vulnerabilities/21421 •

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 0

NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue • http://marc.info/?l=bugtraq&m=110608203729814&w=2 http://support.novell.com/servlet/tidfinder/10096251 http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-01/0771.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2005-01/0341.html http://www.osvdb.org/13135 http://www.securityfocus.com/bid/12285 https://exchange.xforce.ibmcloud.com/vulnerabilities/18954 •