CVE-2001-1487 – QPopper 4.0.x - PopAuth Trace File Shell Command Execution
https://notcve.org/view.php?id=CVE-2001-1487
popauth utility in Qualcomm Qpopper 4.0 and earlier allows local users to overwrite arbitrary files and execute commands as the pop user via a symlink attack on the -trace file option. • https://www.exploit-db.com/exploits/21185 http://www.securityfocus.com/archive/1/246069 https://exchange.xforce.ibmcloud.com/vulnerabilities/7707 •
CVE-2000-1198 – Qualcomm qpopper 2.53/3.0 / RedHat imap 4.5 -4 / UoW imap 4.5 popd - Lock File Denial of Service
https://notcve.org/view.php?id=CVE-2000-1198
qpopper POP server creates lock files with predictable names, which allows local users to cause a denial of service for other users (lack of mail access) by creating lock files for other mail boxes. • https://www.exploit-db.com/exploits/19869 http://marc.info/?l=bugtraq&m=95624629924545&w=2 http://marc.info/?l=bugtraq&m=95634229925906&w=2 http://www.securityfocus.com/bid/1132 • CWE-667: Improper Locking •
CVE-2001-1068
https://notcve.org/view.php?id=CVE-2001-1068
qpopper 4.01 with PAM based authentication on Red Hat systems generates different error messages when an invalid username is provided instead of a valid name, which allows remote attackers to determine valid usernames on the system. • http://archives.neohapsis.com/archives/bugtraq/2001-08/0363.html http://www.securityfocus.com/bid/3242 https://exchange.xforce.ibmcloud.com/vulnerabilities/7047 •
CVE-2001-1046
https://notcve.org/view.php?id=CVE-2001-1046
Buffer overflow in qpopper (aka qpop or popper) 4.0 through 4.0.2 allows remote attackers to gain privileges via a long username. • http://archives.neohapsis.com/archives/linux/caldera/2001-q3/0006.html http://marc.info/?l=vuln-dev&m=98777649031406&w=2 http://www.securityfocus.com/archive/1/188267 http://www.securityfocus.com/bid/2811 https://exchange.xforce.ibmcloud.com/vulnerabilities/6647 •
CVE-2000-0442 – Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input
https://notcve.org/view.php?id=CVE-2000-0442
Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command. • https://www.exploit-db.com/exploits/19955 http://archives.neohapsis.com/archives/bugtraq/2000-05/0267.html http://www.novell.com/linux/security/advisories/suse_security_announce_51.html http://www.securityfocus.com/bid/1242 •