Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Novell GroupWise Client up to 2012.0 SP1 Pointer os command injection

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Novell GroupWise Client up to 2012.0 SP1 Pointer os command injection


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vuldb.com

A vulnerability was found in Novell GroupWise Client up to 2012.0 SP1 (Groupware Software). It has been rated as very critical. Affected by this issue is an unknown functionality of the component Pointer Handler. Upgrading to version 8.0.3 eliminates this vulnerability. Applying the patch 2012 SP1 HP1 is able to eliminate this problem. The best possible mitigation is suggested to be patching the affected component. A possible mitigation has been published immediately after the disclosure of the vulnerability. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 13029. ...



๐Ÿ“Œ Novell GroupWise Client up to 2012.0 SP1 Pointer os command injection


๐Ÿ“ˆ 79.11 Punkte

๐Ÿ“Œ Novell GroupWise Client 8.0 Novell Address Book File code injection


๐Ÿ“ˆ 58.69 Punkte

๐Ÿ“Œ Novell GroupWise up to 8.0 GroupWise Internet Agent Off-By-One memory corruption


๐Ÿ“ˆ 54.17 Punkte

๐Ÿ“Œ Novell GroupWise 2012 up to 2012 Web Admin Interface gwia.exe Content-Length numeric error


๐Ÿ“ˆ 52.97 Punkte

๐Ÿ“Œ Novell GroupWise Client 8.0x/2012/2014 on Windows memory corruption


๐Ÿ“ˆ 50.51 Punkte

๐Ÿ“Œ Novell GroupWise Client up to 2012 12.0.1 HP1 on Windows Javascript/Active X Script cross site scripting


๐Ÿ“ˆ 50.51 Punkte

๐Ÿ“Œ Novell GroupWise 2012/8.0/8.00/8.01/8.02 Client for Windows memory corruption


๐Ÿ“ˆ 50.51 Punkte

๐Ÿ“Œ Novell GroupWise 2012/8.0/8.00/8.01/8.02 HTTP interfaces path traversal


๐Ÿ“ˆ 43.55 Punkte

๐Ÿ“Œ Novell GroupWise 2012/8.0/8.00/8.01/8.02 WebAccess merge cross site scripting


๐Ÿ“ˆ 43.55 Punkte

๐Ÿ“Œ Novell GroupWise 2012/8.0/8.00/8.01/8.02 Internet Agent numeric error


๐Ÿ“ˆ 43.55 Punkte

๐Ÿ“Œ Novell Novell Client for Windows DPRPCW32.DLL ndps_xdr_array memory corruption


๐Ÿ“ˆ 35.12 Punkte

๐Ÿ“Œ Novell Novell Client for Windows DPRPCW32.DLL ndps_xdr_array memory corruption


๐Ÿ“ˆ 35.12 Punkte

๐Ÿ“Œ Bugtraq: SEC Consult SA-20160825-0 :: Multiple vulnerabilities in Micro Focus (Novell) GroupWise


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Micro Focus Novell Groupwise bis 2014 R2 Service Pack 1 WebAccess/Post Office Agent Username/Password Heap-based Pufferรผberlauf


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Bugtraq: SEC Consult SA-20160825-0 :: Multiple vulnerabilities in Micro Focus (Novell) GroupWise


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Vuln: Novell GroupWise CVE-2016-9169 Cross Site Scripting Vulnerability


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise up to 7.0 information disclosure [CVE-2007-3571]


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Micro Focus Novell Groupwise bis 2014 R2 Service Pack 1 Administrator Console token/onerror Reflected Cross Site Scripting


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise 6.5.6 Stack-based memory corruption


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise up to 7.0.0 Stored privilege escalation


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell Groupwise 7.0/7.0.2/7.0.3 WebAccess cross site scripting


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise WebAccess /servlet/webacc about weak authentication


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Micro Focus Novell Groupwise bis 2014 R2 Service Pack 1 Email Persistent Cross Site Scripting


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise WebAccess /servlet/webacc error weak authentication


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise up to 8.0 WebAccess information disclosure


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise up to 8.0 WebAccess cross site request forgery


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Micro Focus Novell Groupwise bis 2014 R2 Service Pack 1 Administrator Console token/onerror Reflected Cross Site Scripting


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise memory corruption


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise 5.5/6.0 webacc directory traversal


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise 5.5 HTTP Request GWWEB.EXE HTMLVER information disclosure


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Micro Focus Novell Groupwise bis 2014 R2 Service Pack 1 Email Persistent Cross Site Scripting


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise 5.5/6.0 Servlet Gateway privilege escalation


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise 5.5 WebAccess Directory information disclosure


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Novell GroupWise 6.0/6.5 WebAccess modify information disclosure [Disputed]


๐Ÿ“ˆ 34.12 Punkte

๐Ÿ“Œ Micro Focus Novell Groupwise bis 2014 R2 Service Pack 1 WebAccess/Post Office Agent Username/Password Heap-based Pufferรผberlauf


๐Ÿ“ˆ 34.12 Punkte











matomo