2 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command. imap/nntpd.c en el servidor NNTP (nntpd) para Cyrus IMAPd v2.4.x anterior a v2.4.12 permite a atacantes remotos eludir la autenticación enviando un comando AUTHINFO USER sin un comando AUTHINFO PASS adicional • http://cyrusimap.org/mediawiki/index.php/Latest_Updates http://git.cyrusimap.org/cyrus-imapd/commit/?id=77903669e04c9788460561dd0560b9c916519594 http://secunia.com/advisories/46093 http://secunia.com/secunia_research/2011-68 http://securitytracker.com/id?1026363 http://www.debian.org/security/2011/dsa-2318 http://www.mandriva.com/security/advisories?name=MDVSA-2011:149 http://www.redhat.com/support/errata/RHSA-2011-1508.html https://bugzilla.redhat.com/show_bug.cgi?id=740822 https:// • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd. • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=33723 http://bugs.gentoo.org/show_bug.cgi?id=82404 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000937 http://marc.info/?l=bugtraq&m=110972236203397&w=2 http://secunia.com/advisories/14383 http://security.gentoo.org/glsa/glsa-200502-29.xml http://securitytracker.com/id? •