Page 2 of 12 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command. • https://www.exploit-db.com/exploits/19955 http://archives.neohapsis.com/archives/bugtraq/2000-05/0267.html http://www.novell.com/linux/security/advisories/suse_security_announce_51.html http://www.securityfocus.com/bid/1242 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 0

Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0305.html http://www.osvdb.org/1346 http://www.securityfocus.com/bid/1238 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000523100045.B11049%40HiWAAY.net •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \n. • http://www.securityfocus.com/bid/1133 http://www.securityfocus.com/templates/archive.pike?list=1&msg=9763.000421%40SECURITY.NNOV.RU •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

The default configuration of Cobalt RaQ2 and RaQ3 as specified in access.conf allows remote attackers to view sensitive contents of a .htaccess file. • https://www.exploit-db.com/exploits/19828 http://www.securityfocus.com/bid/1083 http://www.securityfocus.com/templates/advisory.html?id=2150 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000330220757.28456.qmail%40securityfocus.com •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

The siteUserMod.cgi program in Cobalt RaQ2 servers allows any Site Administrator to modify passwords for other users, site administrators, and possibly admin (root). • http://www.securityfocus.com/bid/951 •