2 results (0.027 seconds)

CVSS: 7.5EPSS: 16%CPEs: 12EXPL: 0

Buffer overflow in qmailadmin.c in QmailAdmin before 1.2.10 allows remote attackers to execute arbitrary code via a long PATH_INFO environment variable. • http://cvs.sourceforge.net/viewcvs.py/qmailadmin/qmailadmin/qmailadmin.c?r1=1.6.2.10&r2=1.6.2.11 http://secunia.com/advisories/19262 http://secunia.com/advisories/23019 http://security.gentoo.org/glsa/glsa-200611-15.xml http://sourceforge.net/project/shownotes.php?group_id=6691&release_id=395211 http://www.osvdb.org/23705 http://www.securityfocus.com/bid/16994 http://www.vupen.com/english/advisories/2006/0852 https://exchange.xforce.ibmcloud.com/vulnerabilities/25065 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 3

Buffer overflow in qmailadmin allows local users to gain privileges via a long QMAILADMIN_TEMPLATEDIR environment variable. Desbordamiento de búfer en qmailadmin permite a usuarios locales ganar privilegios mediante una varibale de entorno QMAILADMIN_TEMPLATEDIR larga. • https://www.exploit-db.com/exploits/21683 http://archives.neohapsis.com/archives/bugtraq/2002-08/0016.html http://marc.info/?l=vuln-dev&m=102859603029424&w=2 http://www.inter7.com/qmailadmin/ChangeLog http://www.iss.net/security_center/static/9786.php http://www.securityfocus.com/bid/5404 •