Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell groupwise vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2005-2276
Cross-site scripting (XSS) vulnerability in Novell Groupwise WebAccess 6.5 before July 11, 2005 allows remote malicious users to inject arbitrary web script or HTML via an e-mail message with an encoded javascript URI (e.g. "jAvascript" in an IMG tag.
Novell Groupwise Webaccess 6.5
Novell Groupwise Webaccess 6.0
1 EDB exploit
5
CVSSv2
CVE-2005-0296
NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parame...
Novell Groupwise 6.0
Novell Groupwise Webaccess 6.5
Novell Groupwise 6.5
Novell Groupwise Webaccess 6.0
5
CVSSv2
CVE-2004-2336
Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 up to and including 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote malicious users to read directories and files on the server.
10
CVSSv2
CVE-2003-1551
Unspecified vulnerability in Novell GroupWise 6 SP3 WebAccess before Revision F has unknown impact and attack vectors related to "malicious script."
Novell Groupwise
7.5
CVSSv2
CVE-2002-1088
Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote malicious users to execute arbitrary code via a long RCPT TO command.
Novell Groupwise 6.0
Novell Groupwise 6.0.1
5
CVSSv2
CVE-2002-0341
GWWEB.EXE in GroupWise Web Access 5.5, and possibly other versions, allows remote malicious users to determine the full pathname of the web server via an HTTP request with an invalid HTMLVER parameter.
Novell Groupwise 5.5
4.6
CVSSv2
CVE-2002-0303
GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows malicious users to gain privileges of other users by logging in without a password.
Novell Groupwise 6.0
7.5
CVSSv2
CVE-2001-1195
Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote malicious users to gain privileges.
Novell Groupwise 5.5
Novell Groupwise 6.0
1 EDB exploit
5
CVSSv2
CVE-2001-1458
Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote malicious users to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character.
Novell Groupwise 5.5
Novell Groupwise 6.0
5
CVSSv2
CVE-2001-1231
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote malicious users to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
Novell Groupwise 5.5
Novell Groupwise 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »