CVE-2002-0430 – Cobalt RaQ 2.0/3.0/4.0 XTR - 'MultiFileUpload.php' Authentication Bypass
https://notcve.org/view.php?id=CVE-2002-0430
MultiFileUploadHandler.php in the Sun Cobalt RaQ XTR administration interface allows local users to bypass authentication and overwrite arbitrary files via a symlink attack on a temporary file, followed by a request to MultiFileUpload.php. • https://www.exploit-db.com/exploits/21334 https://www.exploit-db.com/exploits/21335 http://archives.neohapsis.com/archives/bugtraq/2002-03/0081.html http://www.securityfocus.com/bid/4252 •
CVE-2002-0348
https://notcve.org/view.php?id=CVE-2002-0348
service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long service argument. • https://github.com/alt3kx/CVE-2002-0348 http://marc.info/?l=bugtraq&m=101495944202452&w=2 http://www.iss.net/security_center/static/8323.php http://www.securityfocus.com/bid/4209 •
CVE-2002-0346
https://notcve.org/view.php?id=CVE-2002-0346
Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to execute arbitrary script as other Cobalt users via Javascript in a URL to (1) service.cgi or (2) alert.cgi. • https://github.com/alt3kx/CVE-2002-0346 http://marc.info/?l=bugtraq&m=101495944202452&w=2 http://www.iss.net/security_center/static/8321.php http://www.securityfocus.com/bid/4211 •
CVE-2002-0347
https://notcve.org/view.php?id=CVE-2002-0347
Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to read password-protected files, and possibly files outside the web root, via a .. (dot dot) in an HTTP request. • https://github.com/alt3kx/CVE-2002-0347 http://marc.info/?l=bugtraq&m=101495944202452&w=2 http://www.iss.net/security_center/static/8322.php http://www.securityfocus.com/bid/4208 •
CVE-2001-1075 – Cobalt Raq3 PopRelayD - Arbitrary SMTP Relay
https://notcve.org/view.php?id=CVE-2001-1075
poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file. • https://www.exploit-db.com/exploits/20994 http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.html http://archives.neohapsis.com/archives/bugtraq/2001-07/0150.html http://www.securityfocus.com/bid/2986 https://exchange.xforce.ibmcloud.com/vulnerabilities/6806 •