CVE-2004-1192 – Citadel/UX 6.27 - Format String
https://notcve.org/view.php?id=CVE-2004-1192
Format string vulnerability in the lprintf function in Citadel/UX 6.27 and earlier allows remote attackers to execute arbitrary code via format string specifiers sent to the server. • https://www.exploit-db.com/exploits/681 http://marc.info/?l=bugtraq&m=110295469430696&w=2 http://marc.info/?l=bugtraq&m=110304986223400&w=2 http://www.nosystem.com.ar/advisories/advisory-09.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/18429 •
CVE-2004-1705 – Citadel/UX - Remote Denial of Service (PoC)
https://notcve.org/view.php?id=CVE-2004-1705
Buffer overflow in Citadel/UX 6.23 and earlier allows remote attackers to cause a denial of service via a long username. • https://www.exploit-db.com/exploits/370 https://www.exploit-db.com/exploits/424 https://www.exploit-db.com/exploits/437 http://marc.info/?l=bugtraq&m=109121546120575&w=2 http://marc.info/?l=bugtraq&m=109146099404071&w=2 http://secunia.com/advisories/12197 http://securitytracker.com/id?1010809 http://www.nosystem.com.ar/advisories/advisory-04.txt http://www.securityfocus.com/bid/10833 https://exchange.xforce.ibmcloud.com/vulnerabilities/16840 •
CVE-2004-1933
https://notcve.org/view.php?id=CVE-2004-1933
Citadel/UX 5.00 through 6.14 installs the database directory and files with world-read permissions, which could allow local users to bypass access controls and read unauthorized messages. • http://marc.info/?l=bugtraq&m=108180024428804&w=2 http://www.securityfocus.com/bid/10102 https://exchange.xforce.ibmcloud.com/vulnerabilities/15850 •
CVE-2002-0432
https://notcve.org/view.php?id=CVE-2002-0432
Buffer overflow in (1) lprintf and (2) cprintf in sysdep.c of Citadel/UX 5.90 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attacks such as a long HELO command to the SMTP server. • http://online.securityfocus.com/archive/1/260934 http://uncensored.citadel.org/pub/citadel/citadel-ux-5.91.tar.gz http://www.iss.net/security_center/static/8426.php http://www.securityfocus.com/bid/4263 •