Vulnerabilities > Novell > Groupwise > 6.0

DATE CVE VULNERABILITY TITLE RISK
2002-10-04 CVE-2002-1088 Buffer Overflow vulnerability in Novell Groupwise 6.0/6.0.1
Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote attackers to execute arbitrary code via a long RCPT TO command.
network
low complexity
novell
7.5
2002-05-31 CVE-2002-0303 Authentication Bypass vulnerability in Novell Groupwise 6.0
GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password.
local
low complexity
novell
4.6
2001-12-15 CVE-2001-1195 Authentication vulnerability in Novell Groupwise Servlet Gateway Default
Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote attackers to gain privileges.
network
low complexity
novell
7.5
2001-10-15 CVE-2001-1458 Unspecified vulnerability in Novell Groupwise 5.5/6.0
Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote attackers to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character.
network
low complexity
novell
5.0
2001-08-14 CVE-2001-1231 Unspecified vulnerability in Novell Groupwise 5.5/6.0
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
network
low complexity
novell
5.0