Page 2 of 16 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 2

service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long service argument. • https://github.com/alt3kx/CVE-2002-0348 http://marc.info/?l=bugtraq&m=101495944202452&w=2 http://www.iss.net/security_center/static/8323.php http://www.securityfocus.com/bid/4209 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 3

poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file. • https://www.exploit-db.com/exploits/20994 http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.html http://archives.neohapsis.com/archives/bugtraq/2001-07/0150.html http://www.securityfocus.com/bid/2986 https://exchange.xforce.ibmcloud.com/vulnerabilities/6806 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command. • https://www.exploit-db.com/exploits/19955 http://archives.neohapsis.com/archives/bugtraq/2000-05/0267.html http://www.novell.com/linux/security/advisories/suse_security_announce_51.html http://www.securityfocus.com/bid/1242 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 0

Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0305.html http://www.osvdb.org/1346 http://www.securityfocus.com/bid/1238 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000523100045.B11049%40HiWAAY.net •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \n. • http://www.securityfocus.com/bid/1133 http://www.securityfocus.com/templates/archive.pike?list=1&msg=9763.000421%40SECURITY.NNOV.RU •