CVE-2000-0442 – Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input
https://notcve.org/view.php?id=CVE-2000-0442
Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command. • https://www.exploit-db.com/exploits/19955 http://archives.neohapsis.com/archives/bugtraq/2000-05/0267.html http://www.novell.com/linux/security/advisories/suse_security_announce_51.html http://www.securityfocus.com/bid/1242 •
CVE-2000-0431
https://notcve.org/view.php?id=CVE-2000-0431
Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0305.html http://www.osvdb.org/1346 http://www.securityfocus.com/bid/1238 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000523100045.B11049%40HiWAAY.net •
CVE-2000-0320
https://notcve.org/view.php?id=CVE-2000-0320
Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \n. • http://www.securityfocus.com/bid/1133 http://www.securityfocus.com/templates/archive.pike?list=1&msg=9763.000421%40SECURITY.NNOV.RU •
CVE-2000-0234 – Cobalt RaQ 2.0/3.0 - Apache .htaccess Disclosure
https://notcve.org/view.php?id=CVE-2000-0234
The default configuration of Cobalt RaQ2 and RaQ3 as specified in access.conf allows remote attackers to view sensitive contents of a .htaccess file. • https://www.exploit-db.com/exploits/19828 http://www.securityfocus.com/bid/1083 http://www.securityfocus.com/templates/advisory.html?id=2150 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000330220757.28456.qmail%40securityfocus.com •
CVE-2000-0117
https://notcve.org/view.php?id=CVE-2000-0117
The siteUserMod.cgi program in Cobalt RaQ2 servers allows any Site Administrator to modify passwords for other users, site administrators, and possibly admin (root). • http://www.securityfocus.com/bid/951 •