Novell

Groupwise Messenger

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 26.87%
  • Published 29.03.2013 16:09:05
  • Last modified 11.04.2025 00:51:21

Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and earlier, and Novell Messenger 2.1.x and 2.2.x before 2.2.2, allows remote attackers to execute arbitrary code via an import command containing a long stri...

  • EPSS 1.69%
  • Published 08.12.2011 11:55:01
  • Last modified 11.04.2025 00:51:21

The server process in Novell Messenger 2.1 and 2.2.x before 2.2.1, and Novell GroupWise Messenger 2.04 and earlier, allows remote attackers to read from arbitrary memory locations via a crafted command.

  • EPSS 70.77%
  • Published 13.06.2008 19:41:00
  • Last modified 09.04.2025 00:30:58

Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID...

Exploit
  • EPSS 2.41%
  • Published 13.06.2008 19:41:00
  • Last modified 09.04.2025 00:30:58

Novell GroupWise Messenger (GWIM) before 2.0.3 Hot Patch 1 allows remote attackers to cause a denial of service (crash) via a long user ID, possibly involving a popup alert. NOTE: it is not clear whether this issue crosses privilege boundaries.

  • EPSS 10.13%
  • Published 05.10.2006 04:04:00
  • Last modified 09.04.2025 00:30:58

Messenger Agents (nmma.exe) in Novell GroupWise 2.0.2 and 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted HTTP POST request to TCP port 8300 with a modified val parameter, which triggers a null dereference related to ...

  • EPSS 88.81%
  • Published 14.04.2006 10:02:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accide...