Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell groupwise 6.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2001-1195
Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote malicious users to gain privileges.
Novell Groupwise 5.5
Novell Groupwise 6.0
1 EDB exploit
5
CVSSv2
CVE-2001-1458
Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote malicious users to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character.
Novell Groupwise 5.5
Novell Groupwise 6.0
5
CVSSv2
CVE-2001-1231
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote malicious users to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
Novell Groupwise 5.5
Novell Groupwise 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3