Page 2 of 12 results (0.005 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

qpopper POP server creates lock files with predictable names, which allows local users to cause a denial of service for other users (lack of mail access) by creating lock files for other mail boxes. • https://www.exploit-db.com/exploits/19869 http://marc.info/?l=bugtraq&m=95624629924545&w=2 http://marc.info/?l=bugtraq&m=95634229925906&w=2 http://www.securityfocus.com/bid/1132 • CWE-667: Improper Locking •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

Buffer overflow in qpopper (aka qpop or popper) 4.0 through 4.0.2 allows remote attackers to gain privileges via a long username. • http://archives.neohapsis.com/archives/linux/caldera/2001-q3/0006.html http://marc.info/?l=vuln-dev&m=98777649031406&w=2 http://www.securityfocus.com/archive/1/188267 http://www.securityfocus.com/bid/2811 https://exchange.xforce.ibmcloud.com/vulnerabilities/6647 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command. • https://www.exploit-db.com/exploits/19955 http://archives.neohapsis.com/archives/bugtraq/2000-05/0267.html http://www.novell.com/linux/security/advisories/suse_security_announce_51.html http://www.securityfocus.com/bid/1242 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \n. • http://www.securityfocus.com/bid/1133 http://www.securityfocus.com/templates/archive.pike?list=1&msg=9763.000421%40SECURITY.NNOV.RU •

CVSS: 7.2EPSS: 0%CPEs: 30EXPL: 1

Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command. • https://www.exploit-db.com/exploits/19729 http://www.securityfocus.com/bid/948 •