Page 2 of 34 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the Microsoft IIS ISAPI filter (aka application server module) in University of Washington Pubcookie 3.1.0, 3.1.1, 3.2 before 3.2.1b, and 3.3 before 3.3.0a allow remote attackers to inject arbitrary web script or HTML via unspecified attack vectors. • http://pubcookie.org/news/20060306-apps-secadv.html http://secunia.com/advisories/19348 http://www.kb.cert.org/vuls/id/314540 http://www.osvdb.org/24520 http://www.securityfocus.com/bid/17221 •

CVSS: 7.5EPSS: 32%CPEs: 7EXPL: 0

Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely. • ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0081.html http://rhn.redhat.com/errata/RHSA-2006-0276.html http://rhn.redhat.com/errata/RHSA-2006-0549.html http://secunia.com/advisories/17062 http://secunia.com/advisories/17148 http://secunia.com/advisories/17152 http://secunia.com/advisories/17215 http://secunia.com/ad •

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

Race condition in rpdump in Pine 4.62 and earlier allows local users to overwrite arbitrary files via a symlink attack. • http://msgs.securepoint.com/cgi-bin/get/bugtraq0504/126.html http://secunia.com/advisories/14899 http://www.osvdb.org/15456 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users. • http://secunia.com/advisories/14057 http://secunia.com/advisories/14097 http://securitytracker.com/id?1013037 http://www.gentoo.org/security/en/glsa/glsa-200502-02.xml http://www.kb.cert.org/vuls/id/702777 http://www.kb.cert.org/vuls/id/CRDY-68QSL5 http://www.mandriva.com/security/advisories?name=MDKSA-2005:026 http://www.redhat.com/support/errata/RHSA-2005-128.html http://www.securityfocus.com/bid/12391 https://oval.cisecurity.org/repository/search/definition/oval& •

CVSS: 7.5EPSS: 27%CPEs: 13EXPL: 2

Buffer overflow in PINE before 4.58 allows remote attackers to execute arbitrary code via a malformed message/external-body MIME type. Desbordamiento de búfer en PINE anteriores a 4.58 permite a atacantes remotos ejecuta código arbitrario mediante un tipo MIME "message/external-body" malformado. • https://www.exploit-db.com/exploits/99 http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0099.html http://marc.info/?l=bugtraq&m=106322571805153&w=2 http://marc.info/?l=bugtraq&m=106329356702508&w=2 http://www.idefense.com/advisory/09.10.03.txt http://www.redhat.com/support/errata/RHSA-2003-273.html http://www.redhat.com/support/errata/RHSA-2003-274.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A499 https://access& •