Page 8 of 55 results (0.008 seconds)

CVSS: 7.5EPSS: 12%CPEs: 7EXPL: 1

wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress. • https://www.exploit-db.com/exploits/20563 http://www.debian.org/security/2003/dsa-377 •

CVSS: 10.0EPSS: 2%CPEs: 2EXPL: 0

Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL. • ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-036.0.txt http://www.novell.com/linux/security/advisories/suse_security_announce_36.html http://www.securityfocus.com/bid/810 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9911171818220.12375-100000%40ray.compu-aid.com •

CVSS: 10.0EPSS: 0%CPEs: 17EXPL: 0

Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR. • http://www.securityfocus.com/bid/599 •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 1

Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine. • http://www.novell.com/linux/security/advisories/pine_update_announcement.html http://www.novell.com/linux/security/advisories/suse_security_announce_6.html http://www.securiteam.com/unixfocus/HHP-Pine_remote_exploit.html http://www.securityfocus.com/bid/1247 •

CVSS: 10.0EPSS: 4%CPEs: 2EXPL: 1

Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command. • https://www.exploit-db.com/exploits/19226 http://www.securityfocus.com/bid/283 •