Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell groupwise 6.0 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2005-0296
NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parame...
Novell Groupwise 6.0
Novell Groupwise Webaccess 6.5
Novell Groupwise 6.5
Novell Groupwise Webaccess 6.0
383
VMScore
CVE-2007-3571
The Apache Web Server as used in Novell NetWare 6.5 and GroupWise allows remote malicious users to obtain sensitive information via a certain directive to Apache that causes the HTTP-Header response to be modified, which may reveal the server's internal IP address.
Novell Groupwise 6.0
Novell Groupwise 6.5
Novell Groupwise 6.5.2
Novell Groupwise 6.5.3
Novell Groupwise 7.0
Novell Groupwise 6.0.1
Novell Groupwise 6.5.4
445
VMScore
CVE-2006-3268
Unspecified vulnerability in the Windows Client API in Novell GroupWise 5.x through 7 might allow users to obtain "random programmatic access" to other email within the same post office.
Novell Groupwise 5.2
Novell Groupwise 5.5
Novell Groupwise 6.5.2
Novell Groupwise 6.5.3
Novell Groupwise 7.0
Novell Groupwise 6.0
Novell Groupwise 6.5
Novell Groupwise 6.5.4
Novell Groupwise
445
VMScore
CVE-2005-2620
grpWise.exe for Novell GroupWise client 5.5 up to and including 6.5.2 stores the password in plaintext in memory, which allows malicious users to obtain the password using a debugger or another mechanism to read process memory.
Novell Groupwise 6.0
Novell Groupwise 6.5
Novell Groupwise 6.5.2
755
VMScore
CVE-2001-1195
Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote malicious users to gain privileges.
Novell Groupwise 5.5
Novell Groupwise 6.0
1 EDB exploit
445
VMScore
CVE-2001-1231
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote malicious users to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
Novell Groupwise 5.5
Novell Groupwise 6.0
445
VMScore
CVE-2001-1458
Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote malicious users to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character.
Novell Groupwise 5.5
Novell Groupwise 6.0
668
VMScore
CVE-2002-1088
Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote malicious users to execute arbitrary code via a long RCPT TO command.
Novell Groupwise 6.0
Novell Groupwise 6.0.1
1000
VMScore
CVE-2012-0271
Integer overflow in the WebConsole component in gwia.exe in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 prior to 8.0.3 HP1 and 2012 before SP1 might allow remote malicious users to execute arbitrary code via a crafted request that triggers a heap-based buffer overflow...
Novell Groupwise 8.02
Novell Groupwise 8.03
Novell Groupwise 8.01
Novell Groupwise 8.0
Novell Groupwise 2012
Novell Groupwise 7.03
Novell Groupwise 7.0.4
Novell Groupwise 7.02
Novell Groupwise 7.01
Novell Groupwise 6.5.4
Novell Groupwise 6.5.7
Novell Groupwise 5.5
Novell Groupwise 5.2
Novell Groupwise 7.0
Novell Groupwise 7.0.3
Novell Groupwise 6.5
Novell Groupwise 6.0.1
Novell Groupwise 6.5.6
Novell Groupwise 6.5.3
Novell Groupwise 6.0
Novell Groupwise 5.57e
Novell Groupwise 6.5.2
1 EDB exploit
445
VMScore
CVE-2012-0410
Directory traversal vulnerability in WebAccess in Novell GroupWise prior to 8.03 allows remote malicious users to read arbitrary files via the User.interface parameter.
Novell Groupwise 6.5.2
Novell Groupwise 6.5.3
Novell Groupwise 6.5
Novell Groupwise 7.02
Novell Groupwise 7.03
Novell Groupwise 7.0.3
Novell Groupwise 8.01
Novell Groupwise 7.0
Novell Groupwise 6.5.7
Novell Groupwise 5.5
Novell Groupwise 5.2
Novell Groupwise 7.01
Novell Groupwise 6.5.6
Novell Groupwise 6.5.4
Novell Groupwise 5.57e
Novell Groupwise 6.0
Novell Groupwise 7.0.4
Novell Groupwise 8.02
Novell Groupwise 8.0
Novell Groupwise
Novell Groupwise 6.0.1
Novell Groupwise 8.00
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »