Novell

Groupwise

74 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.05%
  • Published 03.08.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in Novell GroupWise 6.5 Client allows remote attackers to execute arbitrary code via a GWVW02xx.INI language file with a long entry, as demonstrated using a long ES02TKS.VEW value in the Group Task section.

  • EPSS 0.84%
  • Published 17.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified...

  • EPSS 0.41%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Unspecified vulnerability in Novell GroupWise 6 SP3 WebAccess before Revision F has unknown impact and attack vectors related to "malicious script."

  • EPSS 9.23%
  • Published 04.10.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote attackers to execute arbitrary code via a long RCPT TO command.

  • EPSS 0.17%
  • Published 25.06.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

GWWEB.EXE in GroupWise Web Access 5.5, and possibly other versions, allows remote attackers to determine the full pathname of the web server via an HTTP request with an invalid HTMLVER parameter.

  • EPSS 0.04%
  • Published 31.05.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password.

Exploit
  • EPSS 4.7%
  • Published 15.12.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote attackers to gain privileges.

Exploit
  • EPSS 0.89%
  • Published 15.10.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote attackers to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character.

Exploit
  • EPSS 0.74%
  • Published 14.08.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

GroupWise WebAccess 5.5 with directory indexing enabled allows a remote attacker to view arbitrary directory contents via an HTTP request with a lowercase "get".

  • EPSS 1.66%
  • Published 14.08.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.