Lucene search

K
NovellGroupwise Messenger2.0

5 matches found

CVE
CVE
added 2013/03/29 4:9 p.m.126 views

CVE-2013-1085

Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and earlier, and Novell Messenger 2.1.x and 2.2.x before 2.2.2, allows remote attackers to execute arbitrary code via an import command containing a long string in the filename parameter.

9.3CVSS8.3AI score0.26866EPSS
CVE
CVE
added 2011/12/08 11:55 a.m.108 views

CVE-2011-3179

The server process in Novell Messenger 2.1 and 2.2.x before 2.2.1, and Novell GroupWise Messenger 2.04 and earlier, allows remote attackers to read from arbitrary memory locations via a crafted command.

5CVSS6.8AI score0.01686EPSS
CVE
CVE
added 2006/04/14 10:2 a.m.58 views

CVE-2006-0992

Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the corre...

10CVSS7.7AI score
CVE
CVE
added 2008/06/13 7:41 p.m.45 views

CVE-2008-2703

Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.

10CVSS7.6AI score0.7077EPSS
CVE
CVE
added 2008/06/13 7:41 p.m.35 views

CVE-2008-2704

Novell GroupWise Messenger (GWIM) before 2.0.3 Hot Patch 1 allows remote attackers to cause a denial of service (crash) via a long user ID, possibly involving a popup alert. NOTE: it is not clear whether this issue crosses privilege boundaries.

5CVSS6.7AI score0.02406EPSS