3 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command. imap/nntpd.c en el servidor NNTP (nntpd) para Cyrus IMAPd v2.4.x anterior a v2.4.12 permite a atacantes remotos eludir la autenticación enviando un comando AUTHINFO USER sin un comando AUTHINFO PASS adicional • http://cyrusimap.org/mediawiki/index.php/Latest_Updates http://git.cyrusimap.org/cyrus-imapd/commit/?id=77903669e04c9788460561dd0560b9c916519594 http://secunia.com/advisories/46093 http://secunia.com/secunia_research/2011-68 http://securitytracker.com/id?1026363 http://www.debian.org/security/2011/dsa-2318 http://www.mandriva.com/security/advisories?name=MDVSA-2011:149 http://www.redhat.com/support/errata/RHSA-2011-1508.html https://bugzilla.redhat.com/show_bug.cgi?id=740822 https:// • CWE-287: Improper Authentication •

CVSS: 5.1EPSS: 89%CPEs: 1EXPL: 5

Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command. • https://www.exploit-db.com/exploits/1813 https://www.exploit-db.com/exploits/16836 https://www.exploit-db.com/exploits/2185 http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0527.html http://securitytracker.com/id?1016131 http://www.securityfocus.com/bid/18056 http://www.vupen.com/english/advisories/2006/1891 https://exchange.xforce.ibmcloud.com/vulnerabilities/26578 •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd. • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=33723 http://bugs.gentoo.org/show_bug.cgi?id=82404 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000937 http://marc.info/?l=bugtraq&m=110972236203397&w=2 http://secunia.com/advisories/14383 http://security.gentoo.org/glsa/glsa-200502-29.xml http://securitytracker.com/id? •