Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Groove Subscribe
Filtered by product Virtual Office
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2007-6530 3 Groove, Hp, Persits 3 Virtual Office, Loadrunner, Xupload 2011-03-07 9.3 HIGH N/A
Buffer overflow in the XUpload.ocx ActiveX control in Persits Software XUpload 2.1.0.1, and probably other versions before 3.0, as used by HP Mercury LoadRunner and Groove Virtual Office, allows remote attackers to execute arbitrary code via a long argument to the AddFolder function.
CVE-2005-1675 1 Groove 2 Groove Workspace, Virtual Office 2008-09-05 4.6 MEDIUM N/A
Groove Virtual Office before 3.1 build 2338, before 3.1a build 2364, and Groove Workspace before 2.5n build 1871 installs the client installation directories with insecure EVERYBODY permissions, which allows local users to gain sensitive information.
CVE-2005-1676 1 Groove 2 Groove Workspace, Virtual Office 2008-09-05 6.8 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in Groove Mobile Workspace in Groove Virtual Office before 3.1 build 2338, before 3.1a build 2364, and Groove Workspace before 2.5n build 1871 allow remote attackers to inject arbitrary web script or HTML via the (1) picture columns embedded within SharePoint lists or (2) drop-down menus in a SharePoint list.
CVE-2005-1677 1 Groove 2 Groove Workspace, Virtual Office 2008-09-05 7.5 HIGH N/A
Unknown vulnerability in Groove Virtual Office before 3.1 build 2338, before 3.1a build 2364, and Groove Workspace before 2.5n build 1871 allows remote attackers to bypass restrictions on COM objects.
CVE-2005-1678 1 Groove 2 Groove Workspace, Virtual Office 2008-09-05 2.6 LOW N/A
Groove Virtual Office before 3.1 build 2338, before 3.1a build 2364, and Groove Workspace before 2.5n build 1871 does not properly display file extensions on attached or embedded files in a compound document, which may allow remote attackers to trick users into executing malicious code.