Page 3 of 16 results (0.003 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:15.imap-uw.asc http://marc.info/?l=bugtraq&m=95624629924545&w=2 http://www.securityfocus.com/bid/1132 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0425.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0437.html http://archives.neohapsis.com/archives/freebsd/2000-09/0108.html http://www.securityfocus.com/bid/1646 http://www.securityfocus.com/bid/1687 https://exchange.xforce.ibmcloud.com/vulnerabilities/5223 •

CVSS: 7.5EPSS: 92%CPEs: 1EXPL: 8

Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands. • https://www.exploit-db.com/exploits/253 https://www.exploit-db.com/exploits/284 https://www.exploit-db.com/exploits/10025 https://www.exploit-db.com/exploits/16846 https://www.exploit-db.com/exploits/397 https://www.exploit-db.com/exploits/19847 https://www.exploit-db.com/exploits/19848 https://www.exploit-db.com/exploits/19849 http://archives.neohapsis.com/archives/bugtraq/2000-04/0074.html http://archives.neohapsis.com/archives/bugtraq/2000-04/0085.html http:&#x •

CVSS: 10.0EPSS: 4%CPEs: 2EXPL: 1

Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command. • https://www.exploit-db.com/exploits/19226 http://www.securityfocus.com/bid/283 •

CVSS: 10.0EPSS: 92%CPEs: 2EXPL: 1

Arbitrary command execution via IMAP buffer overflow in authenticate command. • https://www.exploit-db.com/exploits/19107 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/177 http://www.securityfocus.com/bid/130 •