Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
groupwise vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2011-2661
Multiple cross-site scripting (XSS) vulnerabilities in WebAccess in Novell GroupWise 8.0 before HP3 allow remote malicious users to inject arbitrary web script or HTML via the (1) Directory.Item.name or (2) Directory.Item.displayName parameter.
Novell Groupwise 8.0
10
CVSSv2
CVE-2011-2662
Integer signedness error in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote malicious users to execute arbitrary code via a negative BYWEEKNO property in a weekly RRULE variable in a VCALENDAR attachment in an e-mail message.
Novell Groupwise 8.0
9.3
CVSSv2
CVE-2008-2069
Buffer overflow in Novell GroupWise 7 allows remote malicious users to cause a denial of service or execute arbitrary code via a long argument in a mailto: URI.
Novell Groupwise 7.0
1 EDB exploit
5
CVSSv2
CVE-2005-2804
Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote malicious users to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key.
Novell Groupwise 6.5.3
1 EDB exploit
10
CVSSv2
CVE-2006-0992
Stack-based buffer overflow in Novell GroupWise Messenger prior to 2.0 Public Beta 2 allows remote malicious users to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2...
Novell Groupwise Messenger 2.0
1 EDB exploit
4.3
CVSSv2
CVE-2007-4557
Cross-site scripting (XSS) vulnerability in the webacc servlet in Novell GroupWise 6.5 WebAccess allows remote malicious users to inject arbitrary web script or HTML via the User.Id parameter, as demonstrated by a URL within a url field in a STYLE element, possibly due to an inco...
Novell Groupwise Webaccess 6.5
5
CVSSv2
CVE-2001-1233
Netware Enterprise Web Server 5.1 running GroupWise WebAccess 5.5 with Novell Directory Services (NDS) enabled allows remote malicious users to enumerate user names, group names and other system information by accessing ndsobj.nlm.
Novell Groupwise Webaccess 5.5
Novell Netware 5.1
6.4
CVSSv2
CVE-2007-2590
Nokia Intellisync Mobile Suite 6.4.31.2, 6.6.0.107, and 6.6.2.2, possibly involving Novell Groupwise Mobile Server and Nokia Intellisync Wireless Email Express, allows remote malicious users to obtain user names and other sensitive information via a direct request to (1) usrmgr/u...
Nokia Groupwise Mobile Server
Nokia Intellisync Mobile Suite 6.4.31.2
Nokia Intellisync Mobile Suite 6.6.0.107
Nokia Intellisync Mobile Suite 6.6.2.2
Nokia Intellisync Wireless Email Express
7.5
CVSSv2
CVE-2007-2591
usrmgr/userList.asp in Nokia Intellisync Mobile Suite 6.4.31.2, 6.6.0.107, and 6.6.2.2, possibly involving Novell Groupwise Mobile Server and Nokia Intellisync Wireless Email Express, allows remote malicious users to modify user account details and cause a denial of service (acco...
Nokia Intellisync Mobile Suite 6.6.0.107
Nokia Intellisync Mobile Suite 6.6.2.2
Nokia Intellisync Wireless Email Express
Nokia Groupwise Mobile Server
Nokia Intellisync Mobile Suite 6.4.31.2
4.3
CVSSv2
CVE-2007-2592
Multiple cross-site scripting (XSS) vulnerabilities in Nokia Intellisync Mobile Suite 6.4.31.2, 6.6.0.107, and 6.6.2.2, possibly involving Novell Groupwise Mobile Server and Nokia Intellisync Wireless Email Express, allow remote malicious users to inject arbitrary web script or H...
Nokia Intellisync Wireless Email Express
Nokia Groupwise Mobile Server
Nokia Intellisync Mobile Suite 6.4.31.2
Nokia Intellisync Mobile Suite 6.6.0.107
Nokia Intellisync Mobile Suite 6.6.2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »