Novell Groupwise WebAccess is susceptible to cross site scripting attacks. Versions 7 and 6.5 are susceptible.
ed89535ccb04b5ad07312b883638ed4b701ecaca83e8db67c376289feaf92856
Secunia Security Advisory - A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious users to disclose potentially sensitive information.
b3d3678b34620a561bbf7048398978154087c34de7b1a7f4149fab6d14270651
Secunia Security Advisory - Multiple vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious users to potentially compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks and manipulate certain data
5c75f1b5229ca945c3910f09f48fe3e2af26206e8934dd6b66ec554370d6fb0a
This Metasploit module exploits a stack overflow in Novell GroupWise Messenger Server v2.0. This flaw is triggered by any HTTP request with an Accept-Language header greater than 16 bytes. To overwrite the return address on the stack, we must first pass a memcpy() operation that uses pointers we supply. Due to the large list of restricted characters and the limitations of the current encoder modules, very few payloads are usable.
a1d697bfa45ada6da52e8ea308f0c3606ce2221638b31aed1bbc0ddd602c35ab
Novell Groupwise Client version 7.0.3.1294 suffers from a remote denial of service vulnerability.
a70fbb59e937b11f98df1ec968ce39f1a510f70c890677d3927a58a9f32a1b7c
Secunia Security Advisory - A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious people to conduct cross-site scripting attacks.
9ba64944562d020b4f56ded4c2440d4d479ac8ecc52ed0d3d5991aa73bae4564
Novell Groupwise Client version 7.0.3.129 suffers from a denial of service vulnerability.
a9adc3cfdce33e12b448d8399e80eca61df8b0622d76863d8ade78bd194312cb
Secunia Security Advisory - Some vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and script insertion attacks, or potentially compromise a vulnerable system.
8dd1e486055231835302f7a46f6ffb5f7c610add93ea326a412cc2789d43b0a0
Novell Groupwise Web Access suffers from multiple cross site scripting vulnerabilities.
34039cf5b4e84ca6a0e7d9aed423aeafd3535ab694506f29b51071eebfef1b92
Novell GroupWise versions 8.0 and below malformed RCPT command off-by-one exploit. Affects versions 6.5x, 7.0, 7.01, 7.02, 7.03, 7.03HP1a, and 8.0.
cda22220d5d85f8227845ba12b4f38ab62b6cf123eb8fa3b922c51bdb0f2b0f1
Secunia Security Advisory - Some vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and script insertion attacks, bypass certain security restrictions, or compromise a vulnerable system.
01ca1c4d8aad4a015fa551f39fc336d770c0170fbe9e07940325ecb0f80e8ccf
Novell GroupWise WebAccess suffers from a cross site scripting vulnerability. Version 7.0.3 is affected.
8348d6de98893f1fbe8f491cb7e3dbf8a1f1b7c208a476cf8a27a8b3c4e972c9
Novell GroupWise WebAccess suffers from a cross site scripting vulnerability. Version 7.0.3 is affected.
8c6f6fe9e4d988f1180099d2a613b38e803523f9b1e5b972d27ba0320dec08c6
Novell GroupWise WebAccess suffers from a cross site request forgery vulnerability. Version 7.0.3 is affected.
720e54a18ca643bcc529127da3cfa1c3758769a635c402db883befa22705bec0
ISR-evilgrade is a module framework that allows you to take advantage of poor upgrade implementations by injecting fake updates. This tool is especially useful for DNS cache poisoning attacks.
e76335e42f8a96170e521a354e344acbe972302a445d7803a8159c90337ad9c3
The Novell GroupWise Messenger Client (GWIM) version 2.0 suffers from a remote stack overflow.
0fb39ff951d74e35b5a129db53f49ed20fcdbbf0accc0c08afe719441500a16c
Secunia Security Advisory - A vulnerability has been reported in Novell Groupwise, which can be exploited by malicious people to conduct cross-site scripting attacks.
7dd18f556eda32cf765e1bafce4b00763a4baf9963e6f39d97e519ae43262e2c
Secunia Security Advisory - Some vulnerabilities have been reported in Novell GroupWise Messenger, which can be exploited by malicious people to compromise a vulnerable system.
3003c37011da10a557ae324d3ad5b075bd6efb0eca7a899a1d747bb14be7fd61
Secunia Security Advisory - Juan Pablo Lopez Yacubian has reported a vulnerability in Novell GroupWise, which can be exploited by malicious people to conduct script insertion attacks.
4021c3a4aca96f01b4e1757fa03826e3833f854fa2a66be8bc3c8937e877d74c
Secunia Security Advisory - A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious users to bypass certain security restrictions.
9db45ff52c6e6ee07796a2e42c586e2ffe26a4a38044b940364a32b6f19cd4a5
Secunia Security Advisory - Some vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious people to conduct cross-site scripting attacks.
e4f92b780ffde909851fed542a94b48215e5a499b7d51036846d4647ad11330c
Secunia Security Advisory - Francisco Amato has reported a vulnerability in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.
ca55cd297fcc88d94354e72db1f476a2a879a00dbc8ce0299fd3da3877be3ecd
Metasploit modules for versions 2.7 and 3.0 that exploit a remote stack overflow vulnerability in IMG tag handling for the Novell GroupWise Client version 6.5.6.
c7f87e5264f047a444fdc06b37cfacf18100fb37bdabb5f934e7284defcb4bc2
The Novell GroupWise Client version 6.5.6 suffers from a remote stack overflow vulnerability.
a819ef2d83abd412bef155a5e4a2da786a3f32837d7e10681fc2080cbf6a83ba
ISR-sqlget is a blind SQL injection tool developed in Perl. It supports 20 databases, has various evasions features, SSL and proxy support, and more.
4ac98124e44160901dbd4f0fd6e7b92ffa530dcbfcbc73d2f2122fe5549a1093
Secunia Security Advisory - A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious people to compromise a vulnerable system.
82932d37b2467cfdf473f459af0612d9820e1af12b85e4bbf685b6fea0ffb93e