Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
groupwise vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-2703
Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client prior to 2.0.3 HP1 for Windows allow remote malicious users to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.
Novell Groupwise Messenger 2.0
Novell Groupwise Messenger 2.0.2
Novell Groupwise Messenger 2.0.3
2 EDB exploits
7.5
CVSSv2
CVE-2016-5762
Integer overflow in the Post Office Agent in Novell GroupWise prior to 2014 R2 Service Pack 1 Hot Patch 1 might allow remote malicious users to execute arbitrary code via a long (1) username or (2) password, which triggers a heap-based buffer overflow.
Novell Groupwise
Novell Groupwise 2014
4.3
CVSSv2
CVE-2016-5760
Multiple cross-site scripting (XSS) vulnerabilities in the administrator console in Novell GroupWise prior to 2014 R2 Service Pack 1 Hot Patch 1 allow remote malicious users to inject arbitrary web script or HTML via the (1) token parameter to gwadmin-console/install/login.jsp or...
Novell Groupwise
Novell Groupwise 2014
4.3
CVSSv2
CVE-2016-5761
Cross-site scripting (XSS) vulnerability in Novell GroupWise prior to 2014 R2 Service Pack 1 Hot Patch 1 allows remote malicious users to inject arbitrary web script or HTML via a crafted email.
Novell Groupwise
Novell Groupwise 2014
9.3
CVSSv2
CVE-2013-1085
Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and previous versions, and Novell Messenger 2.1.x and 2.2.x prior to 2.2.2, allows remote malicious users to execute arbitrary code via an import command containing a long string in the fi...
Novell Groupwise Messenger
Novell Groupwise Messenger 2.0.2
Novell Groupwise Messenger 2.0
Novell Groupwise Messenger 1.0.6
Novell Messenger
Novell Messenger 2.2.0
5
CVSSv2
CVE-2001-1458
Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote malicious users to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character.
Novell Groupwise 5.5
Novell Groupwise 6.0
7.5
CVSSv2
CVE-2001-1195
Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote malicious users to gain privileges.
Novell Groupwise 5.5
Novell Groupwise 6.0
1 EDB exploit
5
CVSSv2
CVE-2001-1231
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote malicious users to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
Novell Groupwise 5.5
Novell Groupwise 6.0
9
CVSSv2
CVE-2010-2777
Stack-based buffer overflow in the IMAP server component in GroupWise Internet Agent (GWIA) in Novell GroupWise 7.x prior to 7.0 post-SP4 FTF and 8.x prior to 8.0 SP2 allows remote malicious users to execute arbitrary code via a long mailbox name in a CREATE command.
Novell Groupwise 7.0
Novell Groupwise 8.0
1 EDB exploit
4.3
CVSSv2
CVE-2010-2778
Cross-site scripting (XSS) vulnerability in WebAccess in Novell GroupWise 7.x prior to 7.0 post-SP4 FTF and 8.x prior to 8.0 SP2 allows remote malicious users to inject arbitrary web script or HTML via a crafted message, related to a "Javascript XSS exploit."
Novell Groupwise 8.0
Novell Groupwise 7.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »