Vulnerabilities > Novell > Groupwise
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-08-03 | CVE-2005-2346 | Unspecified vulnerability in Novell Groupwise 6.5 Buffer overflow in Novell GroupWise 6.5 Client allows remote attackers to execute arbitrary code via a GWVW02xx.INI language file with a long entry, as demonstrated using a long ES02TKS.VEW value in the Group Task section. | 7.5 |
2004-12-31 | CVE-2004-2336 | Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 through 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote attackers to read directories and files on the server. | 5.0 |
2003-12-31 | CVE-2003-1551 | Malicious Script vulnerability in Novell GroupWise WebAccess Unspecified vulnerability in Novell GroupWise 6 SP3 WebAccess before Revision F has unknown impact and attack vectors related to "malicious script." | 10.0 |
2002-10-04 | CVE-2002-1088 | Buffer Overflow vulnerability in Novell Groupwise 6.0/6.0.1 Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote attackers to execute arbitrary code via a long RCPT TO command. | 7.5 |
2002-06-25 | CVE-2002-0341 | Remote Security vulnerability in Novell Groupwise 5.5 GWWEB.EXE in GroupWise Web Access 5.5, and possibly other versions, allows remote attackers to determine the full pathname of the web server via an HTTP request with an invalid HTMLVER parameter. | 5.0 |
2002-05-31 | CVE-2002-0303 | Authentication Bypass vulnerability in Novell Groupwise 6.0 GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password. | 4.6 |
2001-12-15 | CVE-2001-1195 | Authentication vulnerability in Novell Groupwise Servlet Gateway Default Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote attackers to gain privileges. | 7.5 |
2001-10-15 | CVE-2001-1458 | Unspecified vulnerability in Novell Groupwise 5.5/6.0 Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote attackers to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character. | 5.0 |
2001-08-14 | CVE-2001-1232 | Unspecified vulnerability in Novell Groupwise 5.5 GroupWise WebAccess 5.5 with directory indexing enabled allows a remote attacker to view arbitrary directory contents via an HTTP request with a lowercase "get". | 5.0 |
2001-08-14 | CVE-2001-1231 | Unspecified vulnerability in Novell Groupwise 5.5/6.0 GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix. | 5.0 |