Filtered by vendor Novell
Subscriptions
Filtered by product Groupwise
Subscriptions
Total
75 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2000-0146 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
The Java Server in the Novell GroupWise Web Access Enhancement Pack allows remote attackers to cause a denial of service via a long URL to the servlet. | ||||
CVE-2001-1458 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote attackers to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character. | ||||
CVE-2001-1232 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
GroupWise WebAccess 5.5 with directory indexing enabled allows a remote attacker to view arbitrary directory contents via an HTTP request with a lowercase "get". | ||||
CVE-2001-1231 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix. | ||||
CVE-2001-1195 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote attackers to gain privileges. | ||||
CVE-2001-0355 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
Novell Groupwise 5.5 (sp1 and sp2) allows a remote user to access arbitrary files via an implementation error in Groupwise system policies. | ||||
CVE-2002-1088 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote attackers to execute arbitrary code via a long RCPT TO command. | ||||
CVE-2002-0341 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
GWWEB.EXE in GroupWise Web Access 5.5, and possibly other versions, allows remote attackers to determine the full pathname of the web server via an HTTP request with an invalid HTMLVER parameter. | ||||
CVE-2002-0303 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password. | ||||
CVE-2003-1551 | 1 Novell | 1 Groupwise | 2024-08-08 | N/A |
Unspecified vulnerability in Novell GroupWise 6 SP3 WebAccess before Revision F has unknown impact and attack vectors related to "malicious script." | ||||
CVE-2004-2336 | 1 Novell | 2 Groupwise, Netware | 2024-08-08 | N/A |
Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 through 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote attackers to read directories and files on the server. | ||||
CVE-2005-2804 | 1 Novell | 1 Groupwise | 2024-08-07 | N/A |
Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key. | ||||
CVE-2005-2620 | 1 Novell | 1 Groupwise | 2024-08-07 | N/A |
grpWise.exe for Novell GroupWise client 5.5 through 6.5.2 stores the password in plaintext in memory, which allows attackers to obtain the password using a debugger or another mechanism to read process memory. | ||||
CVE-2005-2346 | 1 Novell | 1 Groupwise | 2024-08-07 | N/A |
Buffer overflow in Novell GroupWise 6.5 Client allows remote attackers to execute arbitrary code via a GWVW02xx.INI language file with a long entry, as demonstrated using a long ES02TKS.VEW value in the Group Task section. | ||||
CVE-2005-0296 | 1 Novell | 2 Groupwise, Groupwise Webaccess | 2024-08-07 | N/A |
NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue | ||||
CVE-2006-4220 | 1 Novell | 2 Groupwise, Groupwise Webaccess | 2024-08-07 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in webacc in Novell GroupWise WebAccess before 7 Support Pack 3 Public Beta allow remote attackers to inject arbitrary web script or HTML via the (1) User.html, (2) Error, (3) User.Theme.index, and (4) and User.lang parameters. | ||||
CVE-2006-3268 | 1 Novell | 1 Groupwise | 2024-08-07 | N/A |
Unspecified vulnerability in the Windows Client API in Novell GroupWise 5.x through 7 might allow users to obtain "random programmatic access" to other email within the same post office. | ||||
CVE-2007-6435 | 1 Novell | 1 Groupwise | 2024-08-07 | N/A |
Stack-based buffer overflow in Novell GroupWise before 6.5.7, when HTML preview of e-mail is enabled, allows user-assisted remote attackers to execute arbitrary code via a long SRC attribute in an IMG element when forwarding or replying to a crafted e-mail. | ||||
CVE-2007-3571 | 1 Novell | 2 Groupwise, Netware | 2024-08-07 | N/A |
The Apache Web Server as used in Novell NetWare 6.5 and GroupWise allows remote attackers to obtain sensitive information via a certain directive to Apache that causes the HTTP-Header response to be modified, which may reveal the server's internal IP address. | ||||
CVE-2007-2513 | 1 Novell | 1 Groupwise | 2024-08-07 | N/A |
Novell GroupWise 7 before SP2 20070524, and GroupWise 6 before 6.5 post-SP6 20070522, allows remote attackers to obtain credentials via a man-in-the-middle attack. |