what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

ISR-novellxss.txt
Posted Aug 18, 2006
Authored by Francisco Amato | Site infobyte.com.ar

Novell Groupwise WebAccess is susceptible to cross site scripting attacks. Versions 7 and 6.5 are susceptible.

tags | advisory, xss
advisories | CVE-2006-3817
SHA-256 | ed89535ccb04b5ad07312b883638ed4b701ecaca83e8db67c376289feaf92856

Related Files

Secunia Security Advisory 40623
Posted Jul 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | b3d3678b34620a561bbf7048398978154087c34de7b1a7f4149fab6d14270651
Secunia Security Advisory 40622
Posted Jul 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious users to potentially compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks and manipulate certain data

tags | advisory, vulnerability, xss
SHA-256 | 5c75f1b5229ca945c3910f09f48fe3e2af26206e8934dd6b66ec554370d6fb0a
Novell Messenger Server 2.0 Accept-Language Overflow
Posted Nov 26, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack overflow in Novell GroupWise Messenger Server v2.0. This flaw is triggered by any HTTP request with an Accept-Language header greater than 16 bytes. To overwrite the return address on the stack, we must first pass a memcpy() operation that uses pointers we supply. Due to the large list of restricted characters and the limitations of the current encoder modules, very few payloads are usable.

tags | exploit, web, overflow
advisories | CVE-2006-0992
SHA-256 | a1d697bfa45ada6da52e8ea308f0c3606ce2221638b31aed1bbc0ddd602c35ab
Novell Groupwise Client 7.0.3.1294 Denial Of Service
Posted Sep 29, 2009
Authored by Francis Provencher

Novell Groupwise Client version 7.0.3.1294 suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | a70fbb59e937b11f98df1ec968ce39f1a510f70c890677d3927a58a9f32a1b7c
Secunia Security Advisory 36746
Posted Sep 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 9ba64944562d020b4f56ded4c2440d4d479ac8ecc52ed0d3d5991aa73bae4564
Novell Groupwise Client 7.0.3.1294 Denial Of Service
Posted Sep 16, 2009
Authored by Francis Provencher

Novell Groupwise Client version 7.0.3.129 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | a9adc3cfdce33e12b448d8399e80eca61df8b0622d76863d8ade78bd194312cb
Secunia Security Advisory 35177
Posted May 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and script insertion attacks, or potentially compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 8dd1e486055231835302f7a46f6ffb5f7c610add93ea326a412cc2789d43b0a0
Novell Groupwise Cross Site Scripting
Posted May 22, 2009
Authored by sasquatch, leroy | Site securestate.com

Novell Groupwise Web Access suffers from multiple cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
advisories | CVE-2009-1635
SHA-256 | 34039cf5b4e84ca6a0e7d9aed423aeafd3535ab694506f29b51071eebfef1b92
Novell GroupWise 8.0 RCPT Off-By-One Exploit
Posted Feb 4, 2009
Authored by Praveen Darshanam

Novell GroupWise versions 8.0 and below malformed RCPT command off-by-one exploit. Affects versions 6.5x, 7.0, 7.01, 7.02, 7.03, 7.03HP1a, and 8.0.

tags | exploit
advisories | CVE-2009-0410
SHA-256 | cda22220d5d85f8227845ba12b4f38ab62b6cf123eb8fa3b922c51bdb0f2b0f1
Secunia Security Advisory 33744
Posted Feb 2, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and script insertion attacks, bypass certain security restrictions, or compromise a vulnerable system.

tags | advisory, vulnerability, xss, csrf
SHA-256 | 01ca1c4d8aad4a015fa551f39fc336d770c0170fbe9e07940325ecb0f80e8ccf
ProCheckUp Security Advisory 2008.23
Posted Jan 30, 2009
Authored by ProCheckUp, Richard Brain | Site procheckup.com

Novell GroupWise WebAccess suffers from a cross site scripting vulnerability. Version 7.0.3 is affected.

tags | advisory, xss
advisories | CVE-2009-0273
SHA-256 | 8348d6de98893f1fbe8f491cb7e3dbf8a1f1b7c208a476cf8a27a8b3c4e972c9
ProCheckUp Security Advisory 2008.22
Posted Jan 30, 2009
Authored by ProCheckUp, Jan Fry | Site procheckup.com

Novell GroupWise WebAccess suffers from a cross site scripting vulnerability. Version 7.0.3 is affected.

tags | advisory, xss
advisories | CVE-2009-0273
SHA-256 | 8c6f6fe9e4d988f1180099d2a613b38e803523f9b1e5b972d27ba0320dec08c6
ProCheckUp Security Advisory 2008.21
Posted Jan 30, 2009
Authored by Adrian Pastor, ProCheckUp | Site procheckup.com

Novell GroupWise WebAccess suffers from a cross site request forgery vulnerability. Version 7.0.3 is affected.

tags | advisory, csrf
advisories | CVE-2009-0272
SHA-256 | 720e54a18ca643bcc529127da3cfa1c3758769a635c402db883befa22705bec0
isr-evilgrade-1.0.0.tar.gz
Posted Jul 28, 2008
Authored by Francisco Amato | Site infobyte.com.ar

ISR-evilgrade is a module framework that allows you to take advantage of poor upgrade implementations by injecting fake updates. This tool is especially useful for DNS cache poisoning attacks.

tags | exploit
advisories | CVE-2008-1447
SHA-256 | e76335e42f8a96170e521a354e344acbe972302a445d7803a8159c90337ad9c3
novell-overflow.txt
Posted Jul 10, 2008
Authored by Francisco Amato | Site infobyte.com.ar

The Novell GroupWise Messenger Client (GWIM) version 2.0 suffers from a remote stack overflow.

tags | advisory, remote, overflow
advisories | CVE-2008-2703, CVE-2008-2704
SHA-256 | 0fb39ff951d74e35b5a129db53f49ed20fcdbbf0accc0c08afe719441500a16c
Secunia Security Advisory 30839
Posted Jun 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell Groupwise, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 7dd18f556eda32cf765e1bafce4b00763a4baf9963e6f39d97e519ae43262e2c
Secunia Security Advisory 30576
Posted Jun 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Novell GroupWise Messenger, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 3003c37011da10a557ae324d3ad5b075bd6efb0eca7a899a1d747bb14be7fd61
Secunia Security Advisory 29969
Posted May 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Juan Pablo Lopez Yacubian has reported a vulnerability in Novell GroupWise, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 4021c3a4aca96f01b4e1757fa03826e3833f854fa2a66be8bc3c8937e877d74c
Secunia Security Advisory 29409
Posted Mar 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 9db45ff52c6e6ee07796a2e42c586e2ffe26a4a38044b940364a32b6f19cd4a5
Secunia Security Advisory 28778
Posted Feb 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | e4f92b780ffde909851fed542a94b48215e5a499b7d51036846d4647ad11330c
Secunia Security Advisory 28102
Posted Dec 20, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francisco Amato has reported a vulnerability in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ca55cd297fcc88d94354e72db1f476a2a879a00dbc8ce0299fd3da3877be3ecd
ISR-novell_groupwise.tar.gz
Posted Dec 14, 2007
Authored by Francisco Amato | Site infobyte.com.ar

Metasploit modules for versions 2.7 and 3.0 that exploit a remote stack overflow vulnerability in IMG tag handling for the Novell GroupWise Client version 6.5.6.

tags | exploit, remote, overflow
SHA-256 | c7f87e5264f047a444fdc06b37cfacf18100fb37bdabb5f934e7284defcb4bc2
ISR-groupwise.txt
Posted Dec 14, 2007
Authored by Francisco Amato | Site infobyte.com.ar

The Novell GroupWise Client version 6.5.6 suffers from a remote stack overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | a819ef2d83abd412bef155a5e4a2da786a3f32837d7e10681fc2080cbf6a83ba
ISR-sqlget-1.0.0.tar.gz
Posted Jun 26, 2007
Authored by Francisco Amato | Site infobyte.com.ar

ISR-sqlget is a blind SQL injection tool developed in Perl. It supports 20 databases, has various evasions features, SSL and proxy support, and more.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 4ac98124e44160901dbd4f0fd6e7b92ffa530dcbfcbc73d2f2122fe5549a1093
Secunia Security Advisory 24944
Posted Apr 20, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 82932d37b2467cfdf473f459af0612d9820e1af12b85e4bbf685b6fea0ffb93e
Page 3 of 4
Back1234Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close