Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
groupwise vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2008-2703
Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client prior to 2.0.3 HP1 for Windows allow remote malicious users to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.
Novell Groupwise Messenger 2.0
Novell Groupwise Messenger 2.0.2
Novell Groupwise Messenger 2.0.3
2 EDB exploits
383
VMScore
CVE-2016-5760
Multiple cross-site scripting (XSS) vulnerabilities in the administrator console in Novell GroupWise prior to 2014 R2 Service Pack 1 Hot Patch 1 allow remote malicious users to inject arbitrary web script or HTML via the (1) token parameter to gwadmin-console/install/login.jsp or...
Novell Groupwise
Novell Groupwise 2014
383
VMScore
CVE-2016-5761
Cross-site scripting (XSS) vulnerability in Novell GroupWise prior to 2014 R2 Service Pack 1 Hot Patch 1 allows remote malicious users to inject arbitrary web script or HTML via a crafted email.
Novell Groupwise
Novell Groupwise 2014
668
VMScore
CVE-2016-5762
Integer overflow in the Post Office Agent in Novell GroupWise prior to 2014 R2 Service Pack 1 Hot Patch 1 might allow remote malicious users to execute arbitrary code via a long (1) username or (2) password, which triggers a heap-based buffer overflow.
Novell Groupwise
Novell Groupwise 2014
828
VMScore
CVE-2013-1085
Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and previous versions, and Novell Messenger 2.1.x and 2.2.x prior to 2.2.2, allows remote malicious users to execute arbitrary code via an import command containing a long string in the fi...
Novell Groupwise Messenger
Novell Groupwise Messenger 2.0.2
Novell Groupwise Messenger 2.0
Novell Groupwise Messenger 1.0.6
Novell Messenger
Novell Messenger 2.2.0
755
VMScore
CVE-2001-1195
Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote malicious users to gain privileges.
Novell Groupwise 5.5
Novell Groupwise 6.0
1 EDB exploit
383
VMScore
CVE-2007-2513
Novell GroupWise 7 before SP2 20070524, and GroupWise 6 prior to 6.5 post-SP6 20070522, allows remote malicious users to obtain credentials via a man-in-the-middle attack.
Novell Groupwise 6.5
Novell Groupwise 7.0
445
VMScore
CVE-2001-1231
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote malicious users to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
Novell Groupwise 5.5
Novell Groupwise 6.0
445
VMScore
CVE-1999-1006
Groupwise web server GWWEB.EXE allows remote malicious users to determine the real path of the web server via the HELP parameter.
Novell Groupwise 5.2
Novell Groupwise 5.5
445
VMScore
CVE-2001-1458
Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote malicious users to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character.
Novell Groupwise 5.5
Novell Groupwise 6.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »