Page 2 of 9 results (0.034 seconds)

CVSS: 2.1EPSS: 0%CPEs: 12EXPL: 1

Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/20493 http://marc.info/?l=bugtraq&m=98749102621604&w=2 http://marc.info/?l=bugtraq&m=99106787825229&w=2 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-047.php3?dis=8.0 http://www.redhat.com/support/errata/RHSA-2001-042.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6367 •

CVSS: 7.5EPSS: 4%CPEs: 3EXPL: 2

Buffer overflow in the automatic mail checking component of Pine 4.21 and earlier allows remote attackers to execute arbitrary commands via a long From: header. • https://www.exploit-db.com/exploits/20237 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:59.pine.asc http://archives.neohapsis.com/archives/bugtraq/2000-10/0441.html http://www.linux-mandrake.com/en/security/MDKSA-2000-073.php3 http://www.redhat.com/support/errata/RHSA-2000-102.html http://www.securityfocus.com/archive/1/84901 http://www.securityfocus.com/bid/1709 https://exchange.xforce.ibmcloud.com/vulnerabilities/5283 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0425.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0437.html http://archives.neohapsis.com/archives/freebsd/2000-09/0108.html http://www.securityfocus.com/bid/1646 http://www.securityfocus.com/bid/1687 https://exchange.xforce.ibmcloud.com/vulnerabilities/5223 •

CVSS: 10.0EPSS: 2%CPEs: 2EXPL: 0

Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL. • ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-036.0.txt http://www.novell.com/linux/security/advisories/suse_security_announce_36.html http://www.securityfocus.com/bid/810 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9911171818220.12375-100000%40ray.compu-aid.com •