3 results (0.006 seconds)

CVSS: 7.5EPSS: 9%CPEs: 5EXPL: 2

Multiple eval injection vulnerabilities in HylaFAX 4.2.3 and earlier allow remote attackers to execute arbitrary commands via (1) the notify script in HylaFAX 4.2.0 to 4.2.3 and (2) crafted CallID parameters to the faxrcvd script in HylaFAX 4.2.2 and 4.2.3. • https://www.exploit-db.com/exploits/27032 http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719 http://secunia.com/advisories/18314 http://secunia.com/advisories/18337 http://secunia.com/advisories/18366 http://secunia.com/advisories/18489 http://www.debian.org/security/2005/dsa-933 http://www.gentoo.org/security/en/glsa/glsa-200601-03.xml http://www.hylafax.org/content/HylaFAX_4.2.4_release http://www.mandriva.com/security/advisories?name=MDKSA-2006:015 http:/ •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

xferfaxstats in HylaFax 4.2.1 and earlier allows local users to overwrite arbitrary files via a symlink attack on the xferfax$$ temporary file. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384 http://secunia.com/advisories/16906 http://secunia.com/advisories/17022 http://secunia.com/advisories/17107 http://secunia.com/advisories/17187 http://www.debian.org/security/2005/dsa-865 http://www.gentoo.org/security/en/glsa/glsa-200509-21.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:177 http://www.securityfocus.com/bid/14907 •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 0

HylaFax 4.2.1 and earlier does not create or verify ownership of the UNIX domain socket, which might allow local users to read faxes and cause a denial of service by creating the socket using the hyla.unix temporary file. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384 http://secunia.com/advisories/17107 http://www.mandriva.com/security/advisories?name=MDKSA-2005:177 http://www.securityfocus.com/bid/15043 •