Page 3 of 15 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command. • https://www.exploit-db.com/exploits/19955 http://archives.neohapsis.com/archives/bugtraq/2000-05/0267.html http://www.novell.com/linux/security/advisories/suse_security_announce_51.html http://www.securityfocus.com/bid/1242 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 1

Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \n. • http://www.securityfocus.com/bid/1133 http://www.securityfocus.com/templates/archive.pike?list=1&msg=9763.000421%40SECURITY.NNOV.RU •

CVSS: 7.2EPSS: 0%CPEs: 30EXPL: 1

Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command. • https://www.exploit-db.com/exploits/19729 http://www.securityfocus.com/bid/948 •

CVSS: 10.0EPSS: 3%CPEs: 2EXPL: 2

Buffer overflow in Qpopper (qpop) 3.0 allows remote root access via AUTH command. • https://www.exploit-db.com/exploits/19645 https://www.exploit-db.com/exploits/19646 http://www.securityfocus.com/bid/830 •

CVSS: 10.0EPSS: 3%CPEs: 1EXPL: 2

Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command. • https://www.exploit-db.com/exploits/19109 https://www.exploit-db.com/exploits/19110 ftp://patches.sgi.com/support/free/security/advisories/19980801-01-I http://www.securityfocus.com/bid/133 • CWE-121: Stack-based Buffer Overflow •