cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2013-1085,https://securityvulnerability.io/vulnerability/CVE-2013-1085,,"Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and earlier, and Novell Messenger 2.1.x and 2.2.x before 2.2.2, allows remote attackers to execute arbitrary code via an import command containing a long string in the filename parameter.",Novell,Groupwise Messenger,,,0.3254700005054474,false,false,false,false,,false,false,2013-03-29T16:09:00.000Z,0 CVE-2011-3179,https://securityvulnerability.io/vulnerability/CVE-2011-3179,,"The server process in Novell Messenger 2.1 and 2.2.x before 2.2.1, and Novell GroupWise Messenger 2.04 and earlier, allows remote attackers to read from arbitrary memory locations via a crafted command.",Novell,"Groupwise Messenger,Messenger",,,0.47297000885009766,false,false,false,false,,false,false,2011-12-08T11:55:00.000Z,0 CVE-2008-2703,https://securityvulnerability.io/vulnerability/CVE-2008-2703,,"Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via ""spoofed server responses"" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.",Novell,Groupwise Messenger,,,0.916700005531311,false,false,false,false,,false,false,2008-06-13T19:19:00.000Z,0 CVE-2008-2704,https://securityvulnerability.io/vulnerability/CVE-2008-2704,,"Novell GroupWise Messenger (GWIM) before 2.0.3 Hot Patch 1 allows remote attackers to cause a denial of service (crash) via a long user ID, possibly involving a popup alert. NOTE: it is not clear whether this issue crosses privilege boundaries.",Novell,Groupwise Messenger,,,0.05023999884724617,false,false,false,false,,false,false,2008-06-13T19:19:00.000Z,0 CVE-2006-4511,https://securityvulnerability.io/vulnerability/CVE-2006-4511,,"Messenger Agents (nmma.exe) in Novell GroupWise 2.0.2 and 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted HTTP POST request to TCP port 8300 with a modified val parameter, which triggers a null dereference related to ""zero-size strings in blowfish routines.""",Novell,Groupwise Messenger,,,0.24098999798297882,false,false,false,false,,false,false,2006-10-05T04:04:00.000Z,0 CVE-2006-0992,https://securityvulnerability.io/vulnerability/CVE-2006-0992,,"Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier.",Novell,Groupwise Messenger,,,0.8637700080871582,false,false,false,false,,false,false,2006-04-14T10:00:00.000Z,0