
CVE-2005-2276 – Novell Groupwise 6.5 Webaccess - HTML Injection
https://notcve.org/view.php?id=CVE-2005-2276
26 Jul 2005 — Cross-site scripting (XSS) vulnerability in Novell Groupwise WebAccess 6.5 before July 11, 2005 allows remote attackers to inject arbitrary web script or HTML via an e-mail message with an encoded javascript URI (e.g. "jAvascript" in an IMG tag. Vulnerabilidad de secuencia de comandos en sitios cruzados en Novell Groupwise WebAccess 6.5 anterior a July 11, 2005 permite que atacantes remotos inyecten script web arbitrario o HTML mediante un mensaje de correo con un javascript codificado en un URI (e.g. "... • https://www.exploit-db.com/exploits/26001 •

CVE-2005-0296
https://notcve.org/view.php?id=CVE-2005-0296
17 Jan 2005 — NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue • http://marc.info/?l=bugtraq&m=110608203729814&w=2 •

CVE-2004-2336
https://notcve.org/view.php?id=CVE-2004-2336
31 Dec 2004 — Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 through 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote attackers to read directories and files on the server. • http://secunia.com/advisories/11119 •

CVE-2003-1551
https://notcve.org/view.php?id=CVE-2003-1551
31 Dec 2003 — Unspecified vulnerability in Novell GroupWise 6 SP3 WebAccess before Revision F has unknown impact and attack vectors related to "malicious script." • http://secunia.com/advisories/8133 •

CVE-2002-1088
https://notcve.org/view.php?id=CVE-2002-1088
04 Oct 2002 — Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote attackers to execute arbitrary code via a long RCPT TO command. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0296.html •

CVE-2002-0303
https://notcve.org/view.php?id=CVE-2002-0303
03 May 2002 — GroupWise 6, when using LDAP authentication and when Post Office has a blank username and password, allows attackers to gain privileges of other users by logging in without a password. GroupWise 6, cuando se usa autenticación LDAP y cuando Post Office tiene un un nombre de usuario y contraseña en blanco, permite a atacantes ganar privilegios de otros usuaios iniciando una sesión en el sistema sin con contraseña. • http://marc.info/?l=bugtraq&m=101425369510983&w=2 •

CVE-2002-0341
https://notcve.org/view.php?id=CVE-2002-0341
03 May 2002 — GWWEB.EXE in GroupWise Web Access 5.5, and possibly other versions, allows remote attackers to determine the full pathname of the web server via an HTTP request with an invalid HTMLVER parameter. • http://marc.info/?l=bugtraq&m=101494830315071&w=2 •

CVE-2001-1195 – Novell Groupwise 5.5/6.0 Servlet Gateway - Default Authentication
https://notcve.org/view.php?id=CVE-2001-1195
15 Dec 2001 — Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote attackers to gain privileges. • https://www.exploit-db.com/exploits/21182 •

CVE-2001-1458
https://notcve.org/view.php?id=CVE-2001-1458
15 Oct 2001 — Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote attackers to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character. • http://online.securityfocus.com/archive/1/220667 •

CVE-2001-1231
https://notcve.org/view.php?id=CVE-2001-1231
14 Aug 2001 — GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix. • http://support.novell.com/padlock/details.htm •